Skip to content

Similar to Petitpotam, the netdfs service is enabled in Windows Server and AD environments, and the abused RPC method allows privileged processes to access malicious pipes for exploitation

Notifications You must be signed in to change notification settings

crisprss/magicNetdefs

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

2 Commits
 
 
 
 
 
 
 
 
 
 

Repository files navigation

magicNetdfs

Reference

https://github.com/Wh04m1001/DFSCoerce

Usage

考虑进一步更新,目前只是验证该RPC方法的可利用性,后续考虑对SYSTEM令牌的具体利用

Description

利用MS-DFSNM协议 https://docs.microsoft.com/en-us/openspecs/windows_protocols/ms-dfsnm/95a506a8-cae6-4c42-b19d-9c1ed1223979

其中提供了RPC方法NetrDfsRemoveStdRoot,可以进行UNC欺骗使得特权进程访问自定义管道:

Limitation

局限主要在于两个方面,其一是该服务只针对Windows Server或者域环境中:

其二是dfssvc.exe的令牌权限十分有限:

后续考虑滥用SeRestorePrivilege或者SeBackupPrivilege实现一些敏感操作

About

Similar to Petitpotam, the netdfs service is enabled in Windows Server and AD environments, and the abused RPC method allows privileged processes to access malicious pipes for exploitation

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published