githubEdit

User Privileges

Basic Privilege Enumeration

  • Check current user privileges:

    • whoami /priv β†’ Lists all privileges assigned to the current user. This is crucial for identifying rights that could lead to privilege escalation (e.g., SeBackupPrivilege, SeImpersonatePrivilege).

    Common Privileges to Look for:

    • SeBackupPrivilege β†’ Allows the user to bypass file security to perform backups.

    • SeRestorePrivilege β†’ Allows the user to overwrite system files, useful for file replacement attacks.

    • SeTakeOwnershipPrivilege β†’ Allows taking ownership of any object, which can lead to control over important files or processes.

    • SeImpersonatePrivilege β†’ Allows impersonation of a token, often leading to privilege escalation (common in token impersonation attacks).

    • SeDebugPrivilege β†’ Allows debugging processes, typically restricted to admins. Can be used to inject code into privileged processes.

Last updated