What is the primary goal of the privilege escalation tactic?
To exploit a vulnerability or misconfiguration to gain additional privileges on a compromised system.
What is the MITRE ATT&CK Tactic ID for Privilege Escalation?
TA0004.
On Windows, which account group has low privileges and can typically only access or modify their own files?
The Users group.
Which Windows account group has Full Control permissions over most objects on the computer, such as directories, files, and services?
The local Administrators group.
Which built-in Windows account has minimum privileges on the local computer and authenticates on the network with anonymous credentials?
The LocalService account (LOCAL SERVICE).
Which built-in Windows account has minimum privileges locally but authenticates on the network by presenting the computer’s credentials?
The NetworkService account (NETWORK SERVICE).
Which built-in Windows account is generally considered the highest level of access on a system, sometimes having more privileges than Administrators?
The LocalSystem account (SYSTEM).
How do Service User Accounts like LocalSystem inherit their privileges, if not from local group membership?
They inherit their privileges from User Rights Assignments, which are security policy settings.
User Rights Assignments are split into two categories: _____ and User Rights.
Logon Rights
What do ‘Logon Rights’ in Windows security policy control?
They control how and where an account is authorized to log into a computer.
What does the SeBatchLogonRight allow a user to do?
It allows a user to be logged in by a batch-queue service such as the Task Scheduler.
What do ‘User Rights’ in Windows security policy control?
They control access to objects and can override explicit permissions on them.
Which sensitive user right allows a user to read any file, even if they haven’t been granted read access to it?
The SeBackupPrivilege.
Which sensitive user right, often held by service accounts for web or SQL servers, can be abused to obtain SYSTEM privileges?
The SeImpersonatePrivilege.
Why are Windows services a large attack surface for privilege escalation?
Because they frequently run as SYSTEM and can be misconfigured or vulnerable in various ways.
Name one of the built-in Windows utilities used to gather information about installed services.
sc.exe or wmic.exe.
Which type of vulnerability occurs when an adversary can place an executable in a location where it gets executed before the intended one?
Path interception.
What does the PATH environment variable in Windows contain?
It contains a list of directories from which common programs are run.
The PATH variable for a user process is a concatenation of which two paths?
The Machine path and the User path.
Path interception by the PATH variable occurs when a directory writable by standard users is added to the _____ path variable.
machine’s
In the context of PATH variable interception, why is it particularly troublesome when software is installed in the system root (e.g., C:)?
Because directories created in the system root are writeable by standard users by default.
Which command-line utility can be used to read the permissions of a file or directory in Windows?
The cacls command.
The _____ API follows a search order that includes: executing directory, current working directory, System32, 16-bit System, Windows, and then PATH directories.
WinExec
By default, what is the current working directory for all Windows services when they start?
C:\Windows\System32.