Kernel Exploits
Kernel Exploits
Exploit HiveNightmare
Checking Permissions on the SAM File
C:\htb> icacls c:\Windows\System32\config\SAM
C:\Windows\System32\config\SAM BUILTIN\Administrators:(I)(F)
NT AUTHORITY\SYSTEM:(I)(F)
**BUILTIN\Users:(I)(RX)**
APPLICATION PACKAGE AUTHORITY\ALL APPLICATION PACKAGES:(I)(RX)
APPLICATION PACKAGE AUTHORITY\ALL RESTRICTED APPLICATION PACKAGES:(I)(RX)
Successfully processed 1 files; Failed processing 0 filesPerforming Attack and Parsing Password Hashes
Sign With Administrator account
Exploit PrintNightmare
Checking for Spooler Service
Adding Local Admin with PrintNightmare PowerShell PoC
Confirming New Admin User
Enumerating Missing Patches
Examining Installed Updates
Viewing Installed Updates with WMI
CVE-2020-0668 Example
Checking Permissions on Binary
Generating Malicious Binary
Running the Exploit
Checking Permissions of New File
Last updated