githubEdit

SeDebugPrivilege - Dump hashes

Use To run a particular application or service or assist with troubleshooting with administrator privilege without Administrator user

Admins take this privilege by default

Severity:

  • used to capture sensitive information from system memory

  • access/modify kernel and application structures


Exploit SeDebugPrivilege

Debug programs right

C:\irix> **whoami /priv**

PRIVILEGES INFORMATION
----------------------

Privilege Name                            Description                                                        State
========================================= ================================================================== ========
**SeDebugPrivilege**                          Debug programs                                                     Disabled
SeChangeNotifyPrivilege                   Bypass traverse checking                                           Enabled
SeIncreaseWorkingSetPrivilege             Increase a process working set   

default this privilege is disabled but ProcDump can use it if disabled

Dump memory - ProcDump

dump hashes from LSASS

Access Hashed - Mimikatz


Dump Memory - Manual

open task manger → Details → lsass process → create dump file

image.png

Remote Code Execution as SYSTEM

https://github.com/decoder-it/psgetsystem.gitarrow-up-right

First, open an elevated PowerShell console (right-click, run as admin, and type in the credentials for the jordan user). Next, type tasklist to get a listing of running processes and accompanying PIDs.

Here we can target winlogon.exe running under PID 612, which we know runs as SYSTEM on Windows hosts.

Last updated