Chapter 8: Exploiting Services
Now that you have a good grasp of the common privilege escalation attack vectors on Windows, we can take a deeper look at Windows services and begin exploring the privilege escalation techniques that leverage vulnerabilities and misconfigurations in services in order to elevate our privileges on the target system. The objective of this chapter is to identify and exploit vulnerabilities and misconfigurations in common Windows services.
We will explore the process of identifying and exploiting unquoted service paths and weak service permissions, and we will then take a look at how to exploit the Windows secondary logon in order to elevate our privileges. We will also take an in-depth look at the process of identifying and hijacking missing Dynamic Link Libraries (DLLs).
In this chapter, we're going to cover the following main topics:
- Exploiting services and misconfigurations
- Exploiting unquoted service paths
- Exploiting secondary...