hackache
search
⌘Ctrlk
hackache
  • cube[ Hackache ]
  • arrow-progressMetodología
  • linuxLINUX
    • Enumeración
    • Linux
    • Port fordwarding
    • Privilege Escalation
    • Python
    • Reverse Shell
    • Setup
    • Shell interactiva estable
    • Shells
    • Webshell
  • windowsWINDOWS
    • Windows
    • Active Directory
    • Enumeración
    • Privilege Escalation
      • Abuse of SeBackupPrivilege
      • Abuse of SeDebugPrivilege
      • Abuse of SeImpersonate and SeAssignPrimaryToken
      • Abuse of Take Ownership Privilege
      • Attacking a Domain Controller - Copying NTDS.dit
      • Citrix Breakout
      • Credential Hunting
      • DLL (Dynamic Link Library) Injection
      • Hyper-V Administrators
      • Interacting with Users
      • Kernel Exploits
      • Legacy Operating Systems
      • Leveraging DnsAdmins Access
      • Miscellaneous Techniques
      • Otros archivos
      • Pillaging
      • Print Operators
      • Server Operators
      • User Account Control
      • Vulnerable Services
      • Weak Permissions
      • Windows Desktop Versions
      • Windows Server
    • Reverse Shell
    • Transferencia de archivos
  • spider-black-widowvulnerabilities/ATTACKS
    • Vulnerabilities/Attacks
  • databaseDatabases
  • hiveBlockchain
  • globe-pointerCMS
  • binary-lockCryptography
  • microchipHardware
  • helmet-battlePayloads
  • code-simpleProgramming
  • book-bookmarkResources
  • arrow-up-right-and-arrow-down-left-from-centerReversing
  • servicestackServices
  • screwdriver-wrenchTools
  • diamonds-4Various
  • serverWebservers
  • square-listWordlists
  • cubeHack The Box
    • Academy
    • Challenges
    • CTF
    • Machines
    • Pro Labs
    • Sherlocks
  • OverTheWire
  • Vulnyx
    • Machines
  • DOCKER LABS
    • Machines
  • The Hackers Labs
    • Machines
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
  1. windowsWINDOWSchevron-right
  2. Privilege Escalation

Hyper-V Administrators

hashtag
Recursos

  • Hyper-V Administratorsarrow-up-right

  • Manage virtual machines by using Windows Admin Centerarrow-up-right

  • From Hyper-V Admin to SYSTEMarrow-up-right

  • CVE-2018-0952arrow-up-right

  • CVE-2019-0841arrow-up-right


hashtag
Tools

  • Hyper-V EOP via hardlinkarrow-up-right


takeown /F C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe
sc.exe start MozillaMaintenance
PreviousDLL (Dynamic Link Library) Injectionchevron-leftNextInteracting with Userschevron-right

Last updated 4 months ago

  • Recursos
  • Tools