👾
Rootkid - Cyber Journal
Portfolio
  • 👩‍🚀Introduction
    • 🤖About Cyber Journal & Rootkid
    • 📜License Agreement
    • ⚠️Disclaimer
  • 📚Exam Prep Notes
    • 🗒️KLCP Exam (PEN-103) - Notes
      • 1. Linux Fundamentals
      • 2. Introduction
      • 3. About Kali Linux
      • 4. Getting Started with Kali Linux
      • 5. Installing Kali Linux
      • 6. Configuring Kali Linux
      • 7. Helping Yourself and Getting Help
      • 8. Securing and Monitoring Kali Linux
      • 9. Debian Package Management
      • 10. Advanced Usage
      • 11. Kali Linux in the Enterprise
      • 12. Introduction to Security Assessments
      • 13. Conclusion: The Road Ahead
    • 📒ISO/IEC 27001:2022 Lead Auditor - Notes
      • ISO - Training - Day - 1
      • ISO - Training - Day - 2
      • ISO - Training - Day - 3
      • ISO - Training - Day - 4
      • Practice Questions - Notes
      • Other PDF References
    • 📑Junior Penetration Tester (eJPTv2) - Notes
      • 💡Assessment Methodologies
        • 🔍Information Gathering
          • 🌏Passive Information Gathering
          • 🧐Active Information Gathering
        • 👣Footprinting & Scanning
          • 🗺️Mapping a Network
          • 🎛️Port Scanning
        • 🕵️Enumeration
          • 📜SMB Enumeration
          • 📂FTP Enumeration
          • 🐚SSH Enumeration
          • 🕸️HTTP Enumeration
          • 🗄️MySQL & MSSQL Enumeration
        • 🐛Vulnerability Assessment
          • 🩸Case Study: Heartbleed Vulnerability (CVE-2014-0160)
          • 🔵Case Study: EternalBlue Vulnerability (CVE-2017-0143)
          • 👨‍💻Case Study: Log4J Vulnerability (CVE-2021-44228)
      • 🧰Assessment Methodologies: Auditing Fundamentals
      • 📶Host & Network Penetration Testing
        • 💻System/Host Based Attacks
          • 🪟Overview Of Windows Vulnerabilities
          • 💣Exploiting Windows Vulnerabilities
            • 🧨Exploiting Microsoft IIS WebDAV
            • 🧨Exploiting WebDAV With Metasploit
            • 🧨Exploiting SMB With PsExec
            • 🧨Exploiting Windows MS17-010 SMB Vulnerability (EternalBlue)
            • 🧨Exploiting RDP - Brute Force
            • 🧨Exploiting Windows CVE-2019-0708 RDP Vulnerability (BlueKeep)
            • 🧨Exploiting WinRM
          • 📈Windows Privilege Escalation
            • 🔥Windows Kernel Exploits
            • 🔥Bypassing UAC With UACMe
            • 🔥Access Token Impersonation
          • 🗃️Windows File System Vulnerability - Alternate Data Streams
          • 💳Windows Credential Dumping
            • 🔑Searching For Passwords In Windows Configuration Files
            • 🔑Dumping Hashes With Mimikatz
            • 🔑Pass-The-Hash Attacks
          • 💎Linux Vulnerabilities
          • 🎰Exploiting Linux Vulnerabilities
            • 🐚Exploiting Bash CVE-2014-6271 Vulnerability (Shellshock)
            • 🗄️Exploiting FTP - Linux
            • 🔐Exploiting SSH - Linux
            • 📭Exploiting SAMBA - Linux
          • ‼️Linux Privilege Escalation
            • 💥Linux Kernel Exploits
            • 💥Exploiting Misconfigured Cron Jobs
            • 💥Exploiting SUID Binaries
          • 🔐Linux Credential Dumping
        • 📶Network-Based Attacks
          • 📦Tshark & Filtering Basics
          • 🕷️Arp Poisoning
        • 💣The Metasploit Framework (MSF)
        • 💥Exploitation
          • 🖲️Vulnerability Scanning
          • ⚠️Searching For Exploits
          • 🐚Bind & Reverse Shells
          • 👾Exploitation Frameworks
          • 🪟Windows Exploitation
          • 🥌Linux Exploitation
          • ☣️AV Evasion & Obfuscation
        • 🚩Post-Exploitation
          • 🌬️Windows Local Enumeration
          • 📟Linux Local Enumeration
          • 🚜Transferring Files To Windows & Linux Targets
          • 🔼Upgrading Shells
          • 👀Windows Privilege Escalation
          • ⚒️Linux Privilege Escalation
          • 🔮Windows Persistence
          • 🧙Linux Persistence
          • 〰️Dumping & Cracking Windows Hashes (NTLM Hashes)
          • 🍘Dumping & Cracking Linux Password Hashes
          • ➿Pivoting Overview
          • 🧹Clearing Your Tracks On Windows & Linux
        • 🧑‍🔬Social Engineering Fundamentals
      • 🕸️Web Application Penetration Testing
        • ℹ️Intro to Web
        • 🎯Directory Enumeration
        • 🧰BurpSuite and ZAP-Proxy Overview
        • 🛠️Nikto, SQLMap, XSSer & Hydra Overview
      • 👽Extra Resources
        • ➕CIDR Conversion Table
        • 📦Machines or Lab Solved to Practice
    • 📓Certified in Cybersecurity - (ISC)2 - Notes
      • 📝Chapter-1 Security Controls - Notes
      • 📝Chapter-2 Incident Response, Business Continuity & Disaster Recovery - Notes
      • 📝Chapter 3: Access Control Concepts - Notes
      • 📝Chapter 4: Network Security - Notes
      • 📝Chapter 5: Security Operations - Notes
    • 📕Certified Ethical Hacker v12 - Practical - Notes
      • 👣Module 02: Footprinting and Reconnaissance
      • 🔎Module 03: Enumeration
      • Module 04: Scanning Networks
      • Module 05: Vulnerability Analysis
      • 💻Module 06: System Hacking
      • 🐛Module 07: Malware Threats
      • 🧙Module 08: Sniffing
      • 🐧Module 09: Social Engineering
      • ⚠️Module 10: Denial-of-Service
      • 🪝Module 11: Session Hijacking
      • Module 12: Evading IDS, Firewalls, and Honeypots
      • 🗄️Module 13: Hacking Web Servers
      • Module 14: Hacking Web Applications
      • 💉Module 15: SQL Injection
      • Module 16: Hacking Wireless Networks
      • Module 17: Hacking Mobile Platforms
      • Module 18: IoT and OT Hacking
      • Module 19: Cloud Computing
      • Module 20: Cryptography
      • Extra Resources
        • 📚Helpful Resources
        • 📜Cheat Sheet
  • ✍️Blogs
    • Mastering the Art of Logic Flaws: Unraveling Cyber Mysteries !!!
    • How to write a Detailed Vulnerability Report
    • Payment Gateway Bypass on Government Domain.
Powered by GitBook
On this page
  • What is Kernel?
  • Privilege Escalation
  • Windows Kernel
  • Windows Kernel Exploitation
  • Tools & Environment
  • Attack Flow: Post-Exploitation: Privilege Escalation on Windows Systems
  • 1. Establish Initial Access
  • 2. Attempt Privilege Escalation Using Metasploit
  • 3. Manual Privilege Escalation Techniques
  • 4. Upload Exploits to Target System
  • 5. Execute Exploits

Was this helpful?

  1. Exam Prep Notes
  2. Junior Penetration Tester (eJPTv2) - Notes
  3. Host & Network Penetration Testing
  4. System/Host Based Attacks
  5. Windows Privilege Escalation

Windows Kernel Exploits

What is Kernel?

A Kernel is a computer program that is the core of an operating system, managing system resources and hardware with complete control. It acts as a translation layer between hardware and software, facilitating communication between these two layers.

  • Windows Kernel: The Windows kernel is part of the Windows operating system, providing essential services such as memory management, process scheduling, and hardware abstraction. It ensures smooth operation and security of the system by managing system calls and handling low-level tasks.

  • Linux Kernel: The Linux kernel is the heart of the Linux operating system, offering similar functionalities as the Windows kernel. It manages system resources, handles process control, memory management, and device drivers, and provides a stable and efficient environment for running applications and services.

Both kernels are crucial for the stability, security, and performance of their respective operating systems.

Privilege Escalation

  • Privilege escalation is the process of exploiting vulnerabilities or misconfigurations in systems to elevate privileges from one user to another, typically to a user with administrative or root access on a system.

  • Privilege escalation is a vital element of the attack life cycle and is a major determinant in the overall success of a penetration test.

  • After gaining an initial foothold on a target system you will be required to elevate your privileges in order to perform tasks and functionality that require administrative privileges.

  • The importance of privilege escalation in the penetration testing process cannot be overstated or overlooked. Developing your privilege escalation skills will mark you out as a good penetration tester.

Windows Kernel

  • Windows NT Kernel is the core component of all Microsoft Windows versions, designed as a traditional kernel with a user-focused design philosophy. It operates in two main modes:

    • User Mode: Limited access to system resources and hardware, where programs and services run with restricted privileges.

    • Kernel Mode: Unrestricted access to system resources and hardware, responsible for managing devices, system memory, and core OS functions.

Windows Kernel Exploitation

  • Kernel exploits on Windows will typically target vulnerabilities In the Windows kernel to execute arbitrary code in order to run privileged system commands or to obtain a system shell.

  • This process will differ based on the version of Windows being targeted and the kernel exploit being used.

  • Privilege escalation on Windows systems will typically follow the following methodology:

    • Identifying kernel vulnerabilities

    • Downloading, compiling and transferring kernel exploits onto the target system.

Tools & Environment

  • Windows-Exploit-Suggester - This tool compares a targets patch levels against the Microsoft vulnerability database in order to detect potential missing patches on the target. It also notifies the user if there are public exploits and Metasploit modules available for the missing bulletins.

  • Windows-Kernel-Exploits - Collection of Windows Kernel exploits sorted by CVE.

Attack Flow: Post-Exploitation: Privilege Escalation on Windows Systems

1. Establish Initial Access

  • Obtain Basic Access: Ensure you have a Meterpreter session or similar access level on the target system.

2. Attempt Privilege Escalation Using Metasploit

  • Use getsystem Command:

getsystem

This command attempts to elevate privileges based on known vulnerabilities and methods. It tries different techniques like:

  • Token impersonation

  • Kernel exploits

  • Service exploits

  • Run the Local Exploit Suggester:

use post/multi/recon/local_exploit_suggester

This Metasploit module scans the target system to enumerate potential privilege escalation vulnerabilities.

Commands to Run:

use post/multi/recon/local_exploit_suggester
set SESSION <session-id>
run

Output: Lists potential vulnerabilities and corresponding exploits that can be used to elevate privileges.

3. Manual Privilege Escalation Techniques

  • Download and Run Windows Exploit Suggester:

    • Run Locally: Execute the tool on your local system to analyze the target’s security patch levels and find potential exploits.

    Commands:

git clone https://github.com/AonCyberLabs/Windows-Exploit-Suggester
cd Windows-Exploit-Suggester
python windows-exploit-suggester.py --database <path-to-database> --systeminfo <path-to-systeminfo-file>

Output: Provides a list of vulnerabilities with corresponding exploit codes.

4. Upload Exploits to Target System

  • Use the upload Command in Metasploit:

upload <local-file-path> <remote-file-path>

This command allows you to transfer files from your local machine to the compromised target system.

5. Execute Exploits

  • Run the Exploit: Execute the exploit on the target system based on the vulnerabilities identified in the previous steps.

6. Verify Privilege Escalation

  • Check Elevated Privileges: Use commands to verify that you have obtained higher-level access, such as:

whoami /priv



Hacker's Mantra:Berkeley hackers liked to see themselves as rebels against soulless corporate empires. - Eric S. Raymond

PreviousWindows Privilege EscalationNextBypassing UAC With UACMe

Last updated 10 months ago

Was this helpful?

GitHub:

GitHub:

Download: Get the tool from .

📚
📑
📶
💻
📈
🔥
https://github.com/AonCyberLabs/Windows-Exploit-Suggester
https://github.com/SecWiki/windows-kernel-exploits/tree/master/MS16-135
GitHub