Windows Logo

Escalating Privileges to Domain Admin

This method may benefit from some social engineering but will require local Administrator on an machine within the network. Social engineering can be used to speedup the process of enticing a Domain Admin (DA) to login to a system and in-return provide us DA rights.

Should you need to obtain local Administrator privileges and you have access to a machine which isn’t using Bit-locker, here is a guide on doing so (It wont take long).

  1. Create a new scheduled task
  2. Ensure the “Run with highest privileges” checkbox is checked

    Creating a new Scheduled Task with Run as Highest Privileges

    Creating a new Scheduled Task with Run as Highest Privileges. You should probably name the task something inconspicuous

  3. Change the user in which the task will run as to that of the target DA account

    Changing the user which the task will be run by to that of a Domain Admin

    Changing the user which the task will be run by to that of a Domain Admin

  4. Set the trigger to be when the target DA logs onto the machine

    Creating the trigger for when the Domain Admin logs into the machine

    Creating the trigger for when the Domain Admin logs into the machine

  5. Set the action to run ‘net.exe’ -> add the parameter ‘group “Domain Admins” user /add /domain’
Defining the action for when the Domain Admin logs into the machine

Defining the action for when the Domain Admin logs into the machine

How the action should look when entered correctly

How the action should look when entered correctly. Obviously, replace “user” with the account in-which we want to escalate privileges

Now we lay in wait. Perhaps you have Admins which use their DA accounts for remote support, you could always raise a ticket and get them to remote onto the machine. You could also set this trap on a machine which you know the DAs will login to (Provided you have local Admin).

User mcUser Face's security groups before the DA logged into the machine

User mcUser Face’s security groups before the DA logged into the machine

User mcUserFace's security groups after the DA logged into the machine

User mcUserFace’s security groups after the DA logged into the machine

This method can be mitigated through blocking Domain Admins from logging into workstations by group policy and following the principle of least privilege.

Posted in Security, Windows and tagged , , .