关于NT AUTHORITY\LOCAL SERVICE账户的记录

Nov 02, 2020

1.以LOCAL SERVICE权限运行的程序无法访问内核驱动程序,无法访问除“系统中断”、“System”和“系统空闲处理器百分比”之外的所有进程。

2.完全控制(C:\Windows\ServiceProfiles\LocalService文件夹及其所有子文件与子文件夹)

拒绝访问(所有“System Volume Information”文件夹及其子文件和子文件夹和所有其他用户配置文件夹)

读取和执行(其他所有文件或文件夹)

3. LOCAL SERVICE -> System提权相关:

  • SeImpersonatePrivilege
  • SeAssignPrimaryPrivilege
  • SeTcbPrivilege
  • SeBackupPrivilege
  • SeRestorePrivilege
  • SeCreateTokenPrivilege
  • SeLoadDriverPrivilege
  • SeTakeOwnershipPrivilege
  • SeDebugPrivilege

https://3gstudent.github.io/3gstudent.github.io/渗透技巧-Windows-Token九种权限的利用/

Great! You've successfully subscribed.
Great! Next, complete checkout for full access.
Welcome back! You've successfully signed in.
Success! Your account is fully activated, you now have access to all content.
京ICP备18053813号-1