Windows

powerup

winpeas / windows-exploit-suggester.py

Windows

AlwaysInstallElevated install .msi shell

fodhelper.exe privesc

Administrators group account whoami /groups Medium -> High Mandatory level

Weak service permission

  • A low privileged user is allowed to change service configuration - for example change the service binary the service launches when it starts

  • A low privileged user can overwrite the binary the service launches when it starts

SERVICE_ALL_ACCESS or SERVICE_CHANGE_CONFIG

Short life shell, need persist it by setting 2 listeners and run 2nd shell in & b4 1st shell die

Unquoted service path

To list nonstandard services that start automatically

find returned service having path without " " and find if precedential dir writable

JuicyPotato ( SeImpersonate / SeAssignPrimaryToken )

May need to find an CLSID for the Windows version

https://github.com/ohpe/juicy-potato/tree/master/CLSID

JuicyPotato.exe -l 12345 -p C:\Users\Rob\Desktop\rev.exe-t * -c {F7FD3FD6-9994-452D-8DA7-9A8FD87AEEF4}

RouguePotato/PrintSpoofer SeImpersonate

ms16-032 (w/o KB3139914)

Create user for persistency as admin/system

RDP login page "ease of access" system cmd

WindowsXP SP0/1 upnphost SSDPSRV

Need: file transfer to victim, low rev shell

PSexec

If need use PS, need a rev.exe and powershell -ep bypassin new shell

Last updated