Article Excerpt
SCMUACBypass
property | value |
tags | cobalt-strike,github-repo,kerberos,offensive-tradecraft,tradecraft-tool |
url | |
original_word_count | 1 |
Long Summary
SCMUACBypass is a technique that allows attackers to authenticate to the Service Control Manager (SCM) using Kerberos and leverage privilege escalation (LPE) using a service binary payload. This technique is designed to be used in combination with Kerberos relay attack primitives, which means that the appropriate ticket(s) must already be in the attacker's cache. The included Aggressor script registers a new elevate command in Beacon, which is used to establish a link to a child beacon.
The elevate command is used to acquire credentials handle hook, which is then used to change to the Kerberos package. The InitializeSecurityContext is then called for the target HOST/127.0.0.1, and if the status is 00090312 or 00000000, then the link to the child beacon is established.
SCMUACBypass is a powerful technique that can be used to authenticate to the SCM and leverage privilege escalation. It is designed to be used in combination with Kerberos relay attack primitives, and the included Aggressor script registers a new elevate command in Beacon. This command is used to acquire credentials handle hook, which is then used to change to the Kerberos package. If the InitializeSecurityContext is successful, then the link to the child beacon is established. This technique can be used to gain access to a system and elevate privileges.
Overall, SCMUACBypass is a powerful technique that can be used to authenticate to the SCM and leverage privilege escalation. It requires the appropriate ticket(s) to be in the attacker's cache, and the included Aggressor script registers a new elevate command in Beacon. This command is used to acquire credentials handle hook, which is then used to change to the Kerberos package. If the InitializeSecurityContext is successful, then the link to the child beacon is established. This technique can be used to gain access to a system and elevate privileges.
In conclusion, SCMUACBypass is a powerful technique that can be used to authenticate to the SCM and leverage privilege escalation. It requires the appropriate ticket(s) to be in the attacker's cache, and the included Aggressor script registers a new elevate command in Beacon. This command is used to acquire credentials handle hook, which is then used to change to the Kerberos package. If the InitializeSecurityContext is successful, then the link to the child beacon is established. This technique can be
Short Summary
š rasta-mouse/SCMUACBypass
šš½ SCMUACBypass šš½ SCMUACBypass allows attackers to authenticate to the Service Control Manager (SCM) using Kerberos. šš½ It leverages privilege escalation (LPE) using a service binary payload. šš½ This technique requires the appropriate ticket(s) to be in the attacker's cache. šš½ SCMUACBypass is used in combination with Kerberos relay attack primitives. šš½ The included Aggressor script registers a new elevate command in Beacon. šš½ The elevate command acquires credentials handle hook to change to the Kerberos package. šš½ The InitializeSecurityContext is called for the target HOST/127.0.0.1. šš½ If the status is 00090312 or 00000000, the link to the child beacon is established. šš½ SCMUACBypass is a powerful technique for gaining system access and privileging escalation. šš½ It is an effective method for attackers to authenticate and elevate their privileges through Kerberos.
š source link: https://github.com/rasta-mouse/SCMUACBypass
š summarized content: https://hut.threathunterz.com/battlefield-intel/tradecraft-tools/rasta-mousescmuacbypass
#SCMUACBypass #Kerberos #PrivilegeEscalation #AttackPrimitives #ChildBeacon