15.Weak-permissions
whoami command to check current user information
List members of the administrators group
Display the privileges of the current user
Query registry to check if UAC is enabled
Query registry for administrator consent prompt behavior
Get the OS version using PowerShell
Print the PATH environment variable
List tasks and filter for rundll32 processes
Kill a process by specifying its PID
Generate a reverse TCP shell DLL using msfvenom
Start a Python HTTP server to host the DLL payload
Download the DLL file from the attacker's server using curl
Set up Netcat listener to capture the reverse shell
Execute the DLL payload using rundll32
Open advanced system properties dialog
Confirm the current user after potential privilege escalation
1. Permissive File System ACLs (SecurityService)
2. Weak Service Permissions (WindscribeService)
3. Unquoted Service Paths (SystemExplorerHelpService)
4. Permissive Registry ACLs (ModelManagerService)
5. Modifiable Registry Autorun Binary
Key Concepts:
Weak Windows Permissions: Misconfigurations allow privilege escalation.
Service Focus: Services run as SYSTEM, key targets.
Approach, Commands, Tools, and Techniques:
Detect:
SharpUp
,accesschk
,icacls
,wmic
, PowerShell (autorun).Exploit:
copy
,sc config/start/stop
,net localgroup
, PowerShell (registry).Verify:
net localgroup
,sc query
.
Commands:
SharpUp
,accesschk
,icacls
,sc
,net localgroup
,copy
,wmic
, PowerShell (Set-ItemProperty
,Get-CimInstance
).
Last updated