Windows Services

Let’s start by enumerating the services.

sq query

image.png

Now let’s search for vulnerable services.

shell sc query | findstr /i vulns

image.png

Now let’s start escalation!

Unquoted Service Paths

Let’s start by ettin the service name and the paths.

run wmic service get name, pathname

image.png

notice that Service One is not qouted!

Now let’s see our permissions on it

powershell Get-Acl -Path "C:\\Program Files\\Vulnerable Services" | fl

image.png

as we see we can create files!

we can automate the process usin sharpup!