Windows Privilege Escalation - SeBackupPrivilege

Поділитися
Вставка
  • Опубліковано 12 січ 2025

КОМЕНТАРІ • 26

  • @nate8824
    @nate8824 3 роки тому +3

    Thank you! As someone who's preparing for the oscp and struggling with windows privesc techniques, this really helps.
    Please upload more videos like these. 😀

    • @c0nd4
      @c0nd4  3 роки тому +1

      Glad i can help! I do plan on continuing this series.

    • @nate8824
      @nate8824 3 роки тому +1

      @William Frank yes it is!

    • @Cossaw
      @Cossaw 2 роки тому

      @@nate8824 gotta love Near :)

  • @kingsleyndubuisinwobu9021
    @kingsleyndubuisinwobu9021 3 роки тому +1

    Thanks Conda , you are doing an amazing work. Pls more videos like this.

    • @c0nd4
      @c0nd4  3 роки тому

      Thank you!

  • @0xbro
    @0xbro 3 роки тому +2

    Woah didn't know this technique! Thank you so much!

    • @c0nd4
      @c0nd4  3 роки тому +2

      No problem! It's a fun one

  • @ca7986
    @ca7986 3 роки тому +2

    You are amazing dude! 🌟

    • @c0nd4
      @c0nd4  3 роки тому +1

      Thank you!

  • @hewfrebie2597
    @hewfrebie2597 3 роки тому +3

    Can you make video about setting up metasploitable3 both ubuntu 14.04 and windows 2008 that uses a Vagrant and Packer?

  • @Cossaw
    @Cossaw 2 роки тому +1

    These videos are so clean. Thanks for making them!
    On somewhat of a side note; what are some common ways to be able to start attacking AD, but from an external network starting point?

    • @c0nd4
      @c0nd4  2 роки тому

      Thank you! If you're talking about an external standpoint, I'm going to assume the DC isn't accessible and you're only hitting targets in a DMV. In that case, password spraying or gaining a foothold on a domain joined machine in some way is going to be vital.

    • @Cossaw
      @Cossaw 2 роки тому

      @@c0nd4 Do you mean DMZ?
      So would something like bruteforcing VPN and OWA credentials be a good idea?

    • @c0nd4
      @c0nd4  2 роки тому

      Yeah I meant DMZ, autocorrect lol. Those are both good ideas. And when doing this it's important to check the password lockout policy with a client to ensure you don't lock all the accounts out.

    • @Cossaw
      @Cossaw 2 роки тому

      @@c0nd4 Gotcha! Yup, good advice. Feel free to lemme know if there's other good paths in. External assessments might be rather close to adversary simulation in some regards.
      Full attack chain from complete outsider with only access to some externally facing servers and OSINT, to eventually attempting DC takeover. Scary stuff

  • @horusyt4828
    @horusyt4828 3 роки тому +1

    I'm adding user to backup operator but they can't access my shared folder if they are sitting in different location under domain

  • @Talha_Kacar0
    @Talha_Kacar0 3 місяці тому

    Really a explainer video, thanks

  • @mario50000
    @mario50000 Місяць тому

    Thanks for the video
    How do I undo the diskshadow copy? I would like to clean up after myself but struggle to figure it out

  • @razaabbas5668
    @razaabbas5668 2 роки тому

    Absolutely brilliant.

  • @TheBash000
    @TheBash000 2 роки тому

    Do we need the SEBackupPrivilege script if we can already use Shadow Copies and mount to a new drive? We can just download the hives directly from x: ?

  • @quanghuyang2822
    @quanghuyang2822 Рік тому

    Hi, I'm new to the world of security administration, and I was hoping to get some guidance from someone with your expertise. Do you have any advice on mapping out a career path in this area?

  •  9 місяців тому

    i had a problem when i typed "evil-winrm -i -u Administrator -H ", i received
    "Error: An error of type WinRM::WinRMAuthorizationError happened, message is WinRM::WinRMAuthorizationError

    Error: Exiting with code 1"
    Can you help me fix this? thank you!

  • @ashr_
    @ashr_ 3 роки тому +2

    Highergrade, do this with an account with no remote logon access...

    • @Cossaw
      @Cossaw 2 роки тому +1

      oooh I see you like deathcore ;)