Real-time collaboration for Jupyter Notebooks, Linux Terminals, LaTeX, VS Code, R IDE, and more,
all in one place.
Real-time collaboration for Jupyter Notebooks, Linux Terminals, LaTeX, VS Code, R IDE, and more,
all in one place.
Path: blob/master/documentation/modules/post/windows/manage/rid_hijack.md
Views: 11789
Overview
This module will create an entry on the target by modifying some properties of an existing account. It will change the account attributes by setting a Relative Identifier (RID), which should be owned by one existing account on the destination machine.
Taking advantage of some Windows Local Users Management integrity issues, this module will allow to authenticate with one known account credentials (like GUEST account), and access with the privileges of another existing account (like ADMINISTRATOR account), even if the spoofed account is disabled.
By using a meterpreter
session against a Windows host, the module will try to acquire SYSTEM privileges if needed, and will modify some attributes to hijack the permissions of an existing local account and set them to another one.
For more information see csl.com.co.
Vulnerable Software
This module has been tested against:
Windows XP, 2003. (32 bits)
Windows 8.1 Pro. (64 bits)
Windows 10. (64 bits)
Windows Server 2012. (64 bits)
This module was not tested against, but may work on:
Other versions of windows (x86 and x64).
Options
GETSYSTEM: Try to get SYSTEM privileges on the victim. Default:
false
GUEST_ACCOUNT: Use the GUEST built-in account as the destination of the privileges to be hijacked. Set this account as the hijacker. Default:
false
.SESSION: The session to run this module on. Default:
none
.USERNAME: Set the user account (SAM Account Name) of the victim host which will be the destination of the privileges to be hijacked. Set this account as the hijacker. If GUEST_ACCOUNT option is set to
true
, this parameter will be ignored if defined. Default:none
.PASSWORD: Set or change the password of the account defined as the destination of the privileges to be hijacked, either GUEST account or the user account set in USERNAME option. Set password to the hijacker account. Default:
none
.RID: Specify the RID number in decimal of the victim account. This number should be the RID of an existing account on the target host, no matter if it is disabled (i.e.: The RID of the Administrator built-in account is 500). Set the RID owned by the account that will be hijacked. Default:
500
Verification Steps
Get a
meterpreter
session on some host.Do:
use post/windows/manage/rid_hijack
Do:
set SESSION <SESSION_ID>
replacing <SESSION_ID> with the desired session.Do:
set GET_SYSTEM true
.Do:
set GUEST_ACCOUNT true
.Do:
run
Log in on the victim host with the GUEST account credentials.