Module 8 Flashcards

(56 cards)

1
Q

What is the primary goal of the privilege escalation tactic?

A

To exploit a vulnerability or misconfiguration to gain additional privileges on a compromised system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the MITRE ATT&CK Tactic ID for Privilege Escalation?

A

TA0004.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

On Windows, which account group has low privileges and can typically only access or modify their own files?

A

The Users group.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which Windows account group has Full Control permissions over most objects on the computer, such as directories, files, and services?

A

The local Administrators group.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which built-in Windows account has minimum privileges on the local computer and authenticates on the network with anonymous credentials?

A

The LocalService account (LOCAL SERVICE).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which built-in Windows account has minimum privileges locally but authenticates on the network by presenting the computer’s credentials?

A

The NetworkService account (NETWORK SERVICE).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which built-in Windows account is generally considered the highest level of access on a system, sometimes having more privileges than Administrators?

A

The LocalSystem account (SYSTEM).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How do Service User Accounts like LocalSystem inherit their privileges, if not from local group membership?

A

They inherit their privileges from User Rights Assignments, which are security policy settings.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

User Rights Assignments are split into two categories: _____ and User Rights.

A

Logon Rights

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What do ‘Logon Rights’ in Windows security policy control?

A

They control how and where an account is authorized to log into a computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What does the SeBatchLogonRight allow a user to do?

A

It allows a user to be logged in by a batch-queue service such as the Task Scheduler.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What do ‘User Rights’ in Windows security policy control?

A

They control access to objects and can override explicit permissions on them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which sensitive user right allows a user to read any file, even if they haven’t been granted read access to it?

A

The SeBackupPrivilege.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which sensitive user right, often held by service accounts for web or SQL servers, can be abused to obtain SYSTEM privileges?

A

The SeImpersonatePrivilege.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Why are Windows services a large attack surface for privilege escalation?

A

Because they frequently run as SYSTEM and can be misconfigured or vulnerable in various ways.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Name one of the built-in Windows utilities used to gather information about installed services.

A

sc.exe or wmic.exe.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Which type of vulnerability occurs when an adversary can place an executable in a location where it gets executed before the intended one?

A

Path interception.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What does the PATH environment variable in Windows contain?

A

It contains a list of directories from which common programs are run.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

The PATH variable for a user process is a concatenation of which two paths?

A

The Machine path and the User path.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Path interception by the PATH variable occurs when a directory writable by standard users is added to the _____ path variable.

A

machine’s

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

In the context of PATH variable interception, why is it particularly troublesome when software is installed in the system root (e.g., C:)?

A

Because directories created in the system root are writeable by standard users by default.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Which command-line utility can be used to read the permissions of a file or directory in Windows?

A

The cacls command.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

The _____ API follows a search order that includes: executing directory, current working directory, System32, 16-bit System, Windows, and then PATH directories.

24
Q

By default, what is the current working directory for all Windows services when they start?

A

C:\Windows\System32.

25
If the `CreateProcess` API is called without `lpApplicationName` but with `lpCommandLine`, what search order does it follow?
It follows the same search order as the WinExec API (executing directory, current working directory, etc.).
26
Path interception by _____ hijacking occurs when an attacker can write to a directory that precedes the legitimate one in an API's search order.
search order
27
Which directory is the only one that precedes both the binary's current working directory and System32 in the standard search order?
The executing directory (the directory the binary is located in).
28
Path interception by _____ [T1574.009] occurs when a program path contains spaces and is not enclosed in quotations.
unquoted path
29
How does the `CreateProcess` API interpret the unquoted path `C:\Program Files\Bad Application\Bad Program.exe`?
It tries to interpret the path based on whitespaces, checking paths like `C:\Program.exe`, `C:\Program Files\Bad.exe`, etc., before the full path.
30
When abusing a service vulnerability, what specific type of payload must be used?
Dedicated svc.exe payloads must be used.
31
After dropping a malicious binary to exploit an unquoted service path, what must an adversary typically do to execute it?
The service must be stopped and restarted.
32
Which `sc` commands are used to stop and start a Windows service?
`sc_stop [servicename]` and `sc_start [servicename]`.
33
The vulnerability where an adversary can overwrite a service executable due to a weak Access Control Entry is known as _____.
Weak Service File Permissions [T1574.010]
34
What is a major difficulty in exploiting weak service file permissions by overwriting the binary?
The service binary cannot be overwritten while the service is running.
35
Where in the Windows registry are service configurations stored?
In `HKLM\SYSTEM\CurrentControlSet\Services`.
36
What is the MITRE ATT&CK ID for Weak Service Registry Permissions?
T1574.011.
37
If an adversary has FullControl access to a service's registry key, what is a common way to exploit this for privilege escalation?
Change the service's binary path to point to a malicious payload.
38
What is a DLL (dynamic-link library)?
A portable executable (PE) file containing common functionalities that can be used by any program.
39
What is the name for the technique where an adversary places a malicious DLL in a directory that is higher in the search hierarchy than the legitimate one?
DLL Search Order Hijacking [T1574.001].
40
What is the first location Windows checks in the standard DLL search order?
The executing directory.
41
List the standard DLL search order for most applications.
Executing directory, System32 directory, 16-bit System directory, Windows directory, current working directory, and PATH directories.
42
A generic software vulnerability [T1068] in an elevated application, such as _____, can be exploited from a user context for privilege escalation.
deserialization of untrusted data
43
What is `ysoserial.net` used for?
It is a tool for creating .NET gadgets to exploit deserialization vulnerabilities.
44
What Windows mechanism controls access to securable objects using integrity levels like low, medium, high, and system?
Mandatory Integrity Control (MIC).
45
A security principal cannot modify an object that is assigned a _____ integrity level than its own.
higher
46
By default, what integrity level is a user process given, even if the user is in the local administrators group?
A medium integrity level.
47
What Windows defense-in-depth feature acts as a gatekeeper to Mandatory Integrity Control, prompting for consent before an action is run with high integrity?
User Account Control (UAC).
48
What is the purpose of UAC bypass techniques [T1548.002]?
To elevate from a medium-integrity context to a high-integrity context without a UAC prompt.
49
In Cobalt Strike, what is the difference between an 'elevator' and an 'exploit' for UAC bypass?
An 'elevator' (`runasadmin`) runs an arbitrary command, while an 'exploit' (`elevate`) spawns a new Beacon session.
50
What is the syntax for the Cobalt Strike `elevate` command?
`elevate [exploit] [listener]`.
51
What is the syntax for the Cobalt Strike `runasadmin` command?
`runasadmin [exploit] [command] [args]`.
52
Name one of the UAC bypass methods built into both the `elevate` and `runasadmin` commands in Cobalt Strike.
`uac-schtasks` (Bypass UAC with schtasks.exe) or `uac-token-duplication` (Bypass UAC with Token Duplication).
53
In the `cacls` command output, what does the permission key 'F' stand for?
Full control.
54
In the `cacls` command output, what does the permission key 'C' stand for?
Read, write, execute, & delete.
55
What PowerShell cmdlet can be used to view the Access Control List (ACL) of a registry key?
The `Get-Acl` cmdlet.
56
What is the purpose of the `sc_config` command in the context of privilege escalation?
To modify a service's configuration, such as its `BINARY_PATH_NAME`, to point to a malicious executable.