competition-windows-pivot
Compare original and translation side by side
🇺🇸
Original
English🇨🇳
Translation
ChineseCompetition Windows Pivot
竞赛Windows Pivot
Use this skill only as a downstream specialization after is already active and has established sandbox assumptions, node ownership, and evidence priorities. If that has not happened yet, return to first.
$ctf-sandbox-orchestrator$ctf-sandbox-orchestratorUse this skill when the challenge path is dominated by host-to-host movement, replayable ticket material, or Windows privilege edges.
Reply in Simplified Chinese unless the user explicitly requests English.
本技能仅可在已激活,且已完成沙箱假设、节点所有权、证据优先级确认后,作为下游专项技能使用。如果尚未完成上述步骤,请先返回流程。
$ctf-sandbox-orchestrator$ctf-sandbox-orchestrator当竞赛题目的解题路径以主机间移动、可重放票据材料或Windows权限边界为核心时使用本技能。
除非用户明确要求使用英文回复,否则请使用简体中文回复。
Quick Start
快速开始
- Compress the pivot into a concrete chain: foothold -> recovered artifact -> replay path -> pivot host -> resulting capability.
- Separate stored credential material from usable privilege.
- Keep host evidence, ticket evidence, and privilege effect on one timeline.
- Record the exact accepting service or host for every replayed artifact.
- Reproduce the smallest pivot that still proves the privilege edge.
- 将横向移动路径梳理为具体链路:立足点 -> 恢复的工件 -> 重放路径 -> 横向移动目标主机 -> 最终获取的权限。
- 区分存储的凭证材料和可实际使用的权限。
- 将主机证据、票据证据和权限生效事件统一梳理到同一时间线中。
- 为每个重放的工件记录其确切的接受服务或主机。
- 复现能够证明权限边界存在的最小可用横向移动路径。
Workflow
工作流
1. Recover The Replay Material
1. 恢复重放材料
- Inspect SAM, SECURITY, SYSTEM, NTDS, DPAPI, LSA secrets, browser stores, PowerShell history, ETW, Sysmon, and event logs in the active path.
- Distinguish password, hash, ticket, cookie, vault blob, or gMSA material by where it can actually be used.
- 检查当前路径中的SAM、SECURITY、SYSTEM、NTDS、DPAPI、LSA机密、浏览器存储、PowerShell历史记录、ETW、Sysmon以及事件日志。
- 根据密码、哈希、票据、Cookie、保管库blob、gMSA材料的实际可用场景进行区分。
2. Trace The Pivot Chain
2. 追踪横向移动链路
- Map the protocol actually used: WinRM, SMB, RDP, WMI, admin shares, remote registry, or service control.
- When Kerberos matters, record SPN, delegation, PAC or group data, encryption type, and the accepting service.
- When AD edges matter, inspect ACLs, GPO links, SIDHistory, delegation, certificate templates, and replication rights.
- 标记实际使用的协议:WinRM、SMB、RDP、WMI、管理员共享、远程注册表或服务控制。
- 涉及Kerberos时,记录SPN、委派、PAC或组数据、加密类型以及接受服务。
- 涉及AD边界时,检查ACLs、GPO链接、SIDHistory、委派、证书模板以及复制权限。
3. Report The Edge
3. 上报权限边界
- Keep the pivot path concrete and replayable.
- State what artifact crossed which boundary and what capability appeared on the destination host.
- 确保横向移动路径具体可复现。
- 说明哪个工件跨越了哪个边界,以及目标主机上最终获得了什么权限。
Read This Reference
参考资料说明
- Load for the pivot checklist, Kerberos evidence block, and common replay mistakes.
references/windows-pivot.md - If the task is specifically about DPAPI masterkeys, browser or vault stores, protected blobs, or proving where a recovered DPAPI secret is accepted, prefer .
$competition-dpapi-credential-chain - If the task is specifically about LSASS memory, ticket caches, replayable session material, or host-resident credential extraction, prefer .
$competition-lsass-ticket-material - If the task is specifically about delegation edges, SPN trust, S4U flow, or which service accepts the delegated ticket, prefer .
$competition-kerberos-delegation - If the hard part is forced authentication, coercion primitives, relay targets, or the service that accepts relayed auth, prefer .
$competition-relay-coercion-chain
- 加载查看横向移动检查清单、Kerberos证据块以及常见的重放错误。
references/windows-pivot.md - 如果任务专门针对DPAPI主密钥、浏览器或保管库存储、受保护blob,或证明恢复的DPAPI机密可在哪里被接受,请优先使用。
$competition-dpapi-credential-chain - 如果任务专门针对LSASS内存、票据缓存、可重放会话材料或主机驻留凭证提取,请优先使用。
$competition-lsass-ticket-material - 如果任务专门针对委派边界、SPN信任、S4U流,或哪个服务接受委派票据,请优先使用。
$competition-kerberos-delegation - 如果难点在于强制认证、胁迫原语、中继目标或接受中继认证的服务,请优先使用。
$competition-relay-coercion-chain
What To Preserve
需要留存的内容
- Host names, logon IDs, SIDs, SPNs, ticket fields, service names, and event IDs
- Exact replay point and resulting logon session, token, or group change
- Raw host artifacts and derived timeline separately
- 主机名、登录ID、SID、SPN、票据字段、服务名以及事件ID
- 确切的重放点以及最终生成的登录会话、令牌或组变更
- 原始主机工件和派生的时间线分开留存