- Check if there is some service in a path which contains spaces (outside of the windows directory):
wmic service get name,pathname | findstr /i /v "C:\Windows\" | findstr /i /v """
Alternatively in Powershell: See the Windows Service Exploitation article. - Check that it is possible to restart the service, e.g. via
Start-Service $serviceNamein Powershell. - If this is possible, check if we can write somewhere. For example, the executeable service is C:\Program Files\Super App\SuperApp.exe. Then, the following directories should be checked with icacls:
C:\Program.exeC:\Program Files\Super.exeC:\Program Files\Super App\SuperApp.exe
- If you have write access, compile a binary e.g. from the Binary hijacking post and place it there and €profit.
Leave a Reply
You must be logged in to post a comment.