Exploiting Vulnerabilities to Elevate Privileges and Access Sensitive Data
Exploiting Vulnerabilities to Elevate Privileges and Access Sensitive Data
Situation:
This exercise aimed to demonstrate pivoting techniques to access a target host (books.artstailor.com
), elevate privileges to NT AUTHORITY/SYSTEM, and exfiltrate sensitive data. The exercise involved identifying and exploiting vulnerabilities, using Windows commands to gain access, and extracting data from specific directories.
Obstacles:
- Account Lockout Risks:
- Exploiting the
/reset
command to avoid account lockouts during the privilege escalation process.
- Exploiting the
- File Access Restrictions:
- Bypassing file ownership and permissions to access restricted files.
- Multi-System Navigation:
- Pivoting through
costumes.artstailor.com
to reachbooks.artstailor.com
while maintaining session stability.
- Pivoting through
Actions Taken:
- Access Setup:
- Established a remote desktop session to
books.artstailor.com
through a Chisel proxy configured oncostumes.artstailor.com
. - Utilized the
/reset
command to ensure persistent access during the operation.
- Established a remote desktop session to
- Privilege Escalation:
- Ran the
net user
command to change theLocaladmin
account password toPassword123
, enabling administrator-level access.
- Ran the
- User Enumeration:
- Navigated the
Users
directory to list all user accounts on the system.
- Navigated the
- File Discovery:
- Executed the
tree
command to locate directories and files of interest, identifying:- UsefulFacts: Located in
n.nomen-applications
. - creds.txt: Found in
t.turing-documents
.
- UsefulFacts: Located in
- Executed the
- File Access:
- Used
takeown
to change file ownership andicacls
to adjust permissions, enabling access to the identified files.
- Used
- Exfiltration:
- Extracted and analyzed the contents of the files for sensitive data.
Results:
- Vulnerability Exploited:
- The
/reset
command allowed for continuous access without the risk of account lockout. - Weak file permissions enabled unauthorized access to sensitive files.
- The
- Data Retrieved:
- UsefulFacts: Found under
n.nomen-applications
. - creds.txt: Found under
t.turing-documents
.
- UsefulFacts: Found under
- Risk Level:
- Critical: Escalated privileges and unauthorized access to sensitive information pose significant security risks.
Tool Purpose Overview:
Chisel:
- Used to create a SOCKS proxy for pivoting to internal systems.
Proxychains:
- Configured to route traffic through the Chisel proxy, enabling secure access to
books.artstailor.com
.
net user:
- Command used to modify user account privileges, enabling administrator access.
takeown:
- Command to take ownership of restricted files.
icacls:
- Used to modify file permissions, allowing access to protected data.
Recommendations:
- Enforce Strong Password Policies:
- Require complex passwords for all accounts, avoiding easily guessed patterns like
Password123
.
- Require complex passwords for all accounts, avoiding easily guessed patterns like
- Restrict
/reset
Command Usage:- Limit access to administrative commands and enforce logging for command usage.
- Audit File Permissions:
- Regularly review and restrict file ownership and access permissions for sensitive data.
- Strengthen Network Segmentation:
- Isolate critical systems to reduce risks from compromised pivot points.
View PDF Document