NETWORK

ENUMERATION

FOOTHOLD

PRIV ESCALATION

SeBackUpPrivilege basically allows for full system read.

https://github.com/giuliano108/SeBackupPrivilege has a nice set of PowerShell tools for abusing the SeBackupPrivilege. I’ll clone it, and then I’ll need to upload two files to Blackfields:

On Windows, if a user has the “Back up files and directories” right, he gets assigned the SE_BACKUP_NAME/SeBackupPrivilege privilege. Such privilege is disabled by default but when switched on it allows the user to access directories/files that he doesn’t own or doesn’t have permission to.

upload SeBackupPrivilege/SeBackupPrivilegeCmdLets/bin/Debug/SeBackupPrivilegeUtils.dll

upload /opt/SeBackupPrivilege/SeBackupPrivilegeCmdLets/bin/Debug/SeBackupPrivilegeCmdLets.dll

Importing the modules in the current session

import-module .\SeBackupPrivilegeCmdLets.dll
import-module .\SeBackupPrivilegeUtils.dll

Now I can read files across the filesystem. For example, I can’t read C:\Users\Administrator\Desktop\root.txt as a non-admin user:

But I can copy it and read it: