built-in groups - https://ss64.com/nt/syntax-security_groups.html
privileged accounts and groups - https://docs.microsoft.com/en-us/windows-server/identity/ad-ds/plan/security-best-practices/appendix-b--privileged-accounts-and-groups-in-active-directory
We should always check these groups and include a list of each group's members as an appendix in our report for the client to review and determine if access is still necessary.
Backup Operators
Main trick - https://www.hackingarticles.in/windows-privilege-escalation-sebackupprivilege/
Check privileges
whoami /group | net user _USERNAME_
Backup Operators
Backup Operators will provide the SeBackupPrivilege / SeRestorePrivilege
SeBackupPrivilege allows us to traverse any folder and list the folder contents
This allows us to copy any file/folder even if ACLs dont permit us to.
Cant do normal copy. we need to programmatically copy the data, making sure to specify the FILE_FLAG_BACKUP_SEMANTICS flag.
Download the PoC - https://github.com/giuliano108/SeBackupPrivilege
Import Libraries
Import-Module .\SeBackupPrivilegeUtils.dll
Import-Module .\SeBackupPrivilegeCmdLets.dll
Verifying SeBackupPrivilege is Enabled (might require an elevated shell)
NOTE: If a folder or file has an explicit deny entry for our current user or a group they belong to, this will prevent us from accessing it, even if the FILE_FLAG_BACKUP_SEMANTICS flag is specified.
Attacking a Domain Controller - Copying NTDS.dit
The AD DB NTDS.dit is a very attractive target - it contains the NTLM hashes for all user and computer objects in the domain.
But, this file is locked and is also not accessible by unprivileged users.
using diskshadow utility to create a shadow copy of the C drive and expose it as E drive. The NTDS.dit in this shadow copy won't be in use by the system.