Exploiting weak service permissions
This exploit involves leveraging improperly configured service permissions in order to elevate our privileges. The objective of this process is to identify services that run with SYSTEM
or administrative privileges and use the improper permission configurations for the service to execute arbitrary commands through the BINARY_PATH_NAME
parameter.
We can exploit this vulnerability to add a standard user to the local administrators group and consequently achieve an elevated state on the system.
The exploitation process can be performed by following these steps:
- The first step in the process involves identifying services and applications that standard users have access to. This can be facilitated through the use of the
accesschk
utility that is found in the Sysinternals suite. Theaccesschk
executable can be downloaded from here: https://docs.microsoft.com/en-us/sysinternals/downloads/accesschk. - After downloading the
accesschk
executable...