Backup Operators

Information

Backup Operators (S-1-5-32-551) can back up and restore all files on a computer, including OS files, regardless of the permissions that protect those files. Because members of this group can replace files on DCs, they're considered service administrators.

Privilege
Description

Create backups of any files, whilst not restoring their permissions, which equals to arbitrary read access.

Overwrite legitimate executable files with versions that include malicious software used for privilege escalation.

Exploitation

circle-exclamation

If the controlled user has the SeBackupPrivilege, it can dump SAM, SYSTEM, SECURITY and therefore the NTDS.dit on the target system.

Windows

DiskShadow

Create a diskshadowarrow-up-right script from the attack host to expose the c: drive.

# Create a diskshadow script
$ cat diskshadow_script
set context persistent nowriters
add volume c: alias random
create
expose %random% z:

# Convert file into a Windows-compatible format
$ flip -m diskshadow_script
$ sudo unix2dos diskshadow_script # deprecated

Transfer the script to the target host and execute the following steps.

Dump the ntds.dit on the attack host:

For an example of the above method, see Blackfieldarrow-up-right.

DLLs

Downloadarrow-up-right the SeBackupPrivilegeUtils.dll and SeBackupPrivilegeCmdLets.dll on the attack host and transfer them to the target along with the disk_shadow script found above. Behind the scenes, the Copy-FileSebackupPrivilege cmdlet (part of the DLL files) is used to copy the ntds.dit file from the z: volume to the Temp directory.

Dump the ntds.dit from the attack host:

Linux

This membership can be leveraged from Linux using NetExecarrow-up-right or reg.pyarrow-up-right.

Last updated