ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 70 - PT0-003 discussion

Report
Export

During an assessment, a penetration tester manages to get RDP access via a low-privilege user. The tester attempts to escalate privileges by running the following commands:

Import-Module .\PrintNightmare.ps1

Invoke-Nightmare -NewUser 'hacker' -NewPassword 'Password123!' -DriverName 'Print'

The tester attempts to further enumerate the host with the new administrative privileges by using the runas command. However, the access level is still low. Which of the following actions should the penetration tester take next?

A.
Log off and log on with 'hacker'.
Answers
A.
Log off and log on with 'hacker'.
B.
Attempt to add another user.
Answers
B.
Attempt to add another user.
C.
Bypass the execution policy.
Answers
C.
Bypass the execution policy.
D.
Add a malicious printer driver.
Answers
D.
Add a malicious printer driver.
Suggested answer: A

Explanation:

In the scenario where a penetration tester uses the PrintNightmare exploit to create a new user with administrative privileges but still experiences low-privilege access, the tester should log off and log on with the new 'hacker' account to escalate privileges correctly.

PrintNightmare Exploit:

PrintNightmare (CVE-2021-34527) is a vulnerability in the Windows Print Spooler service that allows remote code execution and local privilege escalation.

The provided commands are intended to exploit this vulnerability to create a new user with administrative privileges.

Commands Breakdown:

Import-Module .\PrintNightmare.ps1: Loads the PrintNightmare exploit script.

Invoke-Nightmare -NewUser 'hacker' -NewPassword 'Password123!' -DriverName 'Print': Executes the exploit, creating a new user 'hacker' with administrative privileges.

Issue:

The tester still experiences low privileges despite running the exploit successfully.

This could be due to the current session not reflecting the new privileges.

Solution:

Logging off and logging back on with the new 'hacker' account will start a new session with the updated administrative privileges.

This ensures that the new privileges are applied correctly.

Pentest

Reference:

Privilege Escalation: After gaining initial access, escalating privileges is crucial to gain full control over the target system.

Session Management: Understanding how user sessions work and ensuring that new privileges are recognized by starting a new session.

The use of the PrintNightmare exploit highlights a specific technique for privilege escalation within Windows environments.

By logging off and logging on with the new 'hacker' account, the penetration tester can ensure the new administrative privileges are fully applied, allowing for further enumeration and exploitation of the target system.

asked 02/10/2024
Osman Rana
36 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first