hyper-v-administrators
takeown /F C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe
sc.exe start MozillaMaintenanceExploit
Post
Take ownership of a file
Example of Mozilla maintenance service
./maintenanceservice.exetakeown /F C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exesc.exe start MozillaMaintenanceKey Points:
Virtualization Access: - Members of
Hyper-V Administratorshave full control over virtual machines. - This allows them to clone Domain Controllers and extract NTDS.dit files..vhdx File Deletion and Hard Links: - When a .vhdx file is deleted,
vmms.exeattempts to restore permissions as SYSTEM. - This can be abused to create hard links to protected files. - This is based on CVE-2018-0952 or CVE-2019-0841, or an application that installs a service that runs as system.Mozilla Maintenance Service Example: - The Mozilla Maintenance Service can be targeted for this exploit. - A PowerShell script can be used to grant full control over the
maintenanceservice.exefile. - The file can then be replaced with a malicious executable. - Starting the service results in SYSTEM-level command execution.Mitigation: - The hard-link exploit has been mitigated by the March 2020 Windows security updates Approach, Commands, Tools, and Techniques: 1. Virtualization Access:
Technique: - Clone virtualized Domain Controllers. - Mount virtual disks offline. - Extract NTDS.dit files.
Tools: - Hyper-V Manager. - Virtual Disk tools.
Outcome: - Domain wide credential access. 2. Hard-Link Exploit:
Technique: - Delete a .vhdx file. - Create a hard link to a protected file (e.g.,
maintenanceservice.exe). - Replace the linked file with a malicious executable. - Start the associated service.Tools: - PowerShell (for hard-link creation). -
takeown(for file ownership). -sc.exe(for service management).Commands: -
takeown /F C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe-sc.exe start MozillaMaintenancePowerShell: - PowerShell script to create the hard link and modify file permissions.
Outcome: - SYSTEM level command execution. 3. Considerations:
Vulnerability: - The hard-link exploit relies on specific vulnerabilities (CVE-2018-0952, CVE-2019-0841) or vulnerable services. - The core hard link exploit is patched as of March 2020.
Mitigation: - Keep systems patched. - Implement least privilege for Hyper-V administrators. - Monitor for unauthorized virtual machine operations.
Virtualization Security: - Treat virtualized Domain Controllers with the same security as physical ones. - Segregate virtualization administration.
Last updated