Execution of SymbolicLink-Testing-Tools Utility for Privilege Escalation
The execution of utilities from the `symboliclink-testing-tools` toolkit is detected, which can be used by attackers to exploit Windows symbolic link vulnerabilities to achieve local privilege escalation from a standard user to SYSTEM.
The symboliclink-testing-tools toolkit, publicly available on GitHub, is leveraged to exploit Windows symbolic link vulnerabilities. This toolkit enables attackers to manipulate NTFS junctions, object manager symbolic links, and opportunistic locks (oplocks) to redirect file operations performed by privileged processes. This exploitation leads to local privilege escalation, allowing a standard user to gain SYSTEM privileges. These tools are typically used post-exploitation and are often utilized in scenarios where attackers have already gained initial access to a system. This threat matters because successful exploitation allows attackers to perform arbitrary actions with SYSTEM privileges, leading to complete system compromise, data theft, or the installation of malware.
Attack Chain
- Attacker gains initial access to the target Windows system, typically through phishing or exploiting a remote vulnerability.
- The attacker downloads or transfers the
symboliclink-testing-toolstoolkit to the compromised system. - The attacker uses
CreateNtfsSymlink.exeto create a symbolic link pointing to a sensitive system file or directory. - The attacker utilizes
SetOpLock.exeto set an opportunistic lock (oplock) on the target file, triggering a callback to the attacker-controlled process when the file is accessed. - A SYSTEM-level process attempts to access the original target file.
- The oplock triggers, allowing the attacker to intercept the file operation.
- The attacker redirects the privileged file operation to an arbitrary path, potentially overwriting or deleting critical system files.
- The attacker escalates privileges to SYSTEM due to the redirected privileged file operation, allowing arbitrary code execution.
Impact
Successful exploitation of symbolic link vulnerabilities leads to local privilege escalation, granting attackers SYSTEM-level access. This can result in unauthorized access to sensitive data, installation of malware, and complete compromise of the affected system. The impact is high, especially in environments where least privilege principles are not strictly enforced. The compromise of even a single endpoint can provide an attacker with a foothold to move laterally within the network, impacting all connected systems.
Recommendation
- Deploy the Sigma rule
SymbolicLinkTestingToolsExecutionto detect the execution of specific tools from thesymboliclink-testing-toolstoolkit and tune for your environment. - Monitor process creation events (Sysmon EventID 1 or Windows Event Log Security 4688) for processes listed in the rule.
- Investigate any alerts generated by the Sigma rule, focusing on identifying the parent process and the user context of the executed tool.
- Implement application control solutions to restrict the execution of unauthorized or unknown executables on endpoints to prevent the execution of the
symboliclink-testing-toolsutilities. - Review and enforce least privilege principles to minimize the impact of successful privilege escalation attempts, even if these tools are executed.
Detection coverage 2
SymbolicLinkTestingToolsExecution
highDetects the execution of tools from the symboliclink-testing-tools toolkit, often used for exploiting Windows symbolic link vulnerabilities for local privilege escalation.
Suspicious Parent Process of SymbolicLink-Testing-Tools
mediumDetects suspicious parent processes executing tools from the symboliclink-testing-tools toolkit.
Detection queries are kept inside the platform. Get full rules →