@@ -49,6 +49,10 @@ versions of Windows, the full chain will only work on Windows 8.1.
4949
5050Overview
5151
52+ While this exploit chain makes use of two (now patched) 0day exploits, it also
53+ contains a sandbox escape and EoP technique which are still as of 5/4/2021 not
54+ patched, and remain feasible for integration into future attacka chains today.
55+
5256The Darkhotel APT group (believed to originate from South Korea) launched a
5357campaign againt Chinese and Japanese business executives and government officials
5458through a combination of spear phishing and hacking of luxury hotel networks in
@@ -62,7 +66,7 @@ RCE through the Internet Explorer and Firefox web browsers: CVE-2020-0674 in
6266particular (a UAF in the legacy jscript.dll engine) is exploitable in any process
6367in which legacy JS code can be executed via jscript.dll. In late 2017, Google
6468Project Zero released a blog post entitled "aPAColypse now: Exploiting Windows 10
65- in a Local Network with WPAD/PAC and JScript" https://googleprojectzero.blogspot.com/2017/12/apacolypse-now-exploiting-windows-10-in_18.html
69+ in a Local Network with WPAD/PAC and JScript" [1].
6670
6771This research brought to light a very interesting attack vector which (at the
6872time) affected all versions of Windows from 7 onward: the WPAD service (or
@@ -97,9 +101,8 @@ LOCAL SERVICE to SYSTEM. However, Rotten Potato (which utilizes a port binding
97101in conjunction with a coerced connection/NTLM authentication from the SYSTEM
98102account to generate a security context it then impersonates) had recently had
99103its most popular method to coerce network authentication from the SYSTEM account
100- patched by Microsoft, and I settled on a more robust/modern technique recently
101- publicized by itm4n instead:
102- https://itm4n.github.io/printspoofer-abusing-impersonate-privileges/
104+ patched by Microsoft, and I settled on a more robust/modern technique instead:
105+ named pipe impersonation of a coerced RPC connection from the Print Spooler [2]
103106
104107This technique combined an old RPC interface popular among Red Teamers for TGT
105108harvesting in environments with unconstrained delegation enabled (aka the
@@ -179,5 +182,12 @@ HackSys Team - for tips on the WPAD service and low level JS debugging.
179182
180183itm4n - for the original research on combining the RPC printer bug with
181184 named pipe impersonation.
185+
186+ ~
187+
188+ Links
189+
190+ [1] https://googleprojectzero.blogspot.com/2017/12/apacolypse-now-exploiting-windows-10-in_18.html
191+ [2] https://itm4n.github.io/printspoofer-abusing-impersonate-privileges/
182192
183193```
0 commit comments