tags:windowslpelearning_resource original link: Breaking Barriers and Assumptions: Techniques for Privilege Escalation on Windows: Part 3 newsletter link: exploits.club Weekly Newsletter 33 - CPU Vulns, Breaking Samsung Bootloaders, Tony Hawk Pro Skater, And More


Exploits Club Summary:

ZDI is back this week with their third installment of the ongoing Windows PrivEsc series, this time discussing a technique for leveraging an on-boot delete primitive to abuse the Windows Task Scheduler. The core idea centers around the fact the Task Scheduler “does not validate mount points before it deletes the corresponding .job file from the C:\Windows\Tasks”, and this directory being writeable by a standard user. Furthermore, it uses a hidden file, SA.DAT, to prevent the user from converting the directory to a junction. As such, a user can abuse an on-boot delete primitive to delete SA.DAT and privesc. The post then talks about the difficulties the team has had with vendors in reporting several of these privescs, and why many of the bugs reported in the series remain unpatched