Learn, hack!

Hacking and security documentation: slides, papers, video and audio recordings. All in high-quality, daily updated, avoiding security crap documents. Spreading hacking knowledge, for free, enjoy. Follow on .

Adventures in Limited User Post Exploitation

Type
Paper
Tags
exploiting, Windows
Authors
Nathan Keltner, Tim Elrod
Event
Black Hat USA 2010
Indexed on
Mar 27, 2013
URL
https://media.blackhat.com/bh-us-10/whitepapers/Keltner/BlackHat-USA-2010-Keltner-Elrod-Adventures-In-Limited-User-Post-Exploitation-wp-v1.3.pdf
File name
BlackHat-USA-2010-Keltner-Elrod-Adventures-In-Limited-User-Post-Exploitation-wp-v1.3.pdf
File size
157.8 KB
MD5
d55b5eef39e63900e6bb6b6f203d40c1
SHA1
ec19ac3f623e7d837e5b064037c6fcac6b91c142

Just how much damage *can* be done with EIP under a non-Administrative Windows environment? Much, much more than you likely think. Through new techniques and live examples, attendees will be guided through the modern day attack surface of a restrictive corporate Windows world. Based purely on the Windows privilege model, demonstrations and new code will cover techniques related to collecting and replaying passwords and password hashes, destroying the browser trust model, attacking the network and the domain, and more, all without administrative access. Moving into a world of Windows Vista, 7, and hardened XP environments, the days of easily popping shells with Admin access are becoming less common. When a Limited User is exploited via a client side vulnerability, damage is often believed to be lessened due to the inability of attacker code to access sensitive portions of the OS, such as those containing passwords and password hashes, without an additional privilege escalation exploit. Despite conventional wisdom from vendors and security press, taking your users out of the 'Local Administrators' OU doesn't mean your environment is magically protected from privilege-agnostic attackers.

About us

Secdocs is a project aimed to index high-quality IT security and hacking documents. These are fetched from multiple data sources: events, conferences and generally from interwebs.

Statistics

Serving 8166 documents and 531.0 GB of hacking knowledge, indexed from 2419 authors from 163 security conferences.

Contribute

To support this site and keep it alive, you can click on the buttons below. Any help is really appreciated! This service is provided for free, but real money is needed to pay bills.

Flattr this Click here to lend your support to: Keep live SecDocs for an year and make a donation at www.pledgie.com !