competition-windows-pivot

Compare original and translation side by side

🇺🇸

Original

English
🇨🇳

Translation

Chinese

Competition Windows Pivot

竞赛Windows Pivot

Use this skill only as a downstream specialization after
$ctf-sandbox-orchestrator
is already active and has established sandbox assumptions, node ownership, and evidence priorities. If that has not happened yet, return to
$ctf-sandbox-orchestrator
first.
Use this skill when the challenge path is dominated by host-to-host movement, replayable ticket material, or Windows privilege edges.
Reply in Simplified Chinese unless the user explicitly requests English.
本技能仅可在
$ctf-sandbox-orchestrator
已激活,且已完成沙箱假设、节点所有权、证据优先级确认后,作为下游专项技能使用。如果尚未完成上述步骤,请先返回
$ctf-sandbox-orchestrator
流程。
当竞赛题目的解题路径以主机间移动、可重放票据材料或Windows权限边界为核心时使用本技能。
除非用户明确要求使用英文回复,否则请使用简体中文回复。

Quick Start

快速开始

  1. Compress the pivot into a concrete chain: foothold -> recovered artifact -> replay path -> pivot host -> resulting capability.
  2. Separate stored credential material from usable privilege.
  3. Keep host evidence, ticket evidence, and privilege effect on one timeline.
  4. Record the exact accepting service or host for every replayed artifact.
  5. Reproduce the smallest pivot that still proves the privilege edge.
  1. 将横向移动路径梳理为具体链路:立足点 -> 恢复的工件 -> 重放路径 -> 横向移动目标主机 -> 最终获取的权限。
  2. 区分存储的凭证材料和可实际使用的权限。
  3. 将主机证据、票据证据和权限生效事件统一梳理到同一时间线中。
  4. 为每个重放的工件记录其确切的接受服务或主机。
  5. 复现能够证明权限边界存在的最小可用横向移动路径。

Workflow

工作流

1. Recover The Replay Material

1. 恢复重放材料

  • Inspect SAM, SECURITY, SYSTEM, NTDS, DPAPI, LSA secrets, browser stores, PowerShell history, ETW, Sysmon, and event logs in the active path.
  • Distinguish password, hash, ticket, cookie, vault blob, or gMSA material by where it can actually be used.
  • 检查当前路径中的SAM、SECURITY、SYSTEM、NTDS、DPAPI、LSA机密、浏览器存储、PowerShell历史记录、ETW、Sysmon以及事件日志。
  • 根据密码、哈希、票据、Cookie、保管库blob、gMSA材料的实际可用场景进行区分。

2. Trace The Pivot Chain

2. 追踪横向移动链路

  • Map the protocol actually used: WinRM, SMB, RDP, WMI, admin shares, remote registry, or service control.
  • When Kerberos matters, record SPN, delegation, PAC or group data, encryption type, and the accepting service.
  • When AD edges matter, inspect ACLs, GPO links, SIDHistory, delegation, certificate templates, and replication rights.
  • 标记实际使用的协议:WinRM、SMB、RDP、WMI、管理员共享、远程注册表或服务控制。
  • 涉及Kerberos时,记录SPN、委派、PAC或组数据、加密类型以及接受服务。
  • 涉及AD边界时,检查ACLs、GPO链接、SIDHistory、委派、证书模板以及复制权限。

3. Report The Edge

3. 上报权限边界

  • Keep the pivot path concrete and replayable.
  • State what artifact crossed which boundary and what capability appeared on the destination host.
  • 确保横向移动路径具体可复现。
  • 说明哪个工件跨越了哪个边界,以及目标主机上最终获得了什么权限。

Read This Reference

参考资料说明

  • Load
    references/windows-pivot.md
    for the pivot checklist, Kerberos evidence block, and common replay mistakes.
  • If the task is specifically about DPAPI masterkeys, browser or vault stores, protected blobs, or proving where a recovered DPAPI secret is accepted, prefer
    $competition-dpapi-credential-chain
    .
  • If the task is specifically about LSASS memory, ticket caches, replayable session material, or host-resident credential extraction, prefer
    $competition-lsass-ticket-material
    .
  • If the task is specifically about delegation edges, SPN trust, S4U flow, or which service accepts the delegated ticket, prefer
    $competition-kerberos-delegation
    .
  • If the hard part is forced authentication, coercion primitives, relay targets, or the service that accepts relayed auth, prefer
    $competition-relay-coercion-chain
    .
  • 加载
    references/windows-pivot.md
    查看横向移动检查清单、Kerberos证据块以及常见的重放错误。
  • 如果任务专门针对DPAPI主密钥、浏览器或保管库存储、受保护blob,或证明恢复的DPAPI机密可在哪里被接受,请优先使用
    $competition-dpapi-credential-chain
  • 如果任务专门针对LSASS内存、票据缓存、可重放会话材料或主机驻留凭证提取,请优先使用
    $competition-lsass-ticket-material
  • 如果任务专门针对委派边界、SPN信任、S4U流,或哪个服务接受委派票据,请优先使用
    $competition-kerberos-delegation
  • 如果难点在于强制认证、胁迫原语、中继目标或接受中继认证的服务,请优先使用
    $competition-relay-coercion-chain

What To Preserve

需要留存的内容

  • Host names, logon IDs, SIDs, SPNs, ticket fields, service names, and event IDs
  • Exact replay point and resulting logon session, token, or group change
  • Raw host artifacts and derived timeline separately
  • 主机名、登录ID、SID、SPN、票据字段、服务名以及事件ID
  • 确切的重放点以及最终生成的登录会话、令牌或组变更
  • 原始主机工件和派生的时间线分开留存