πWeak Permissions
π― Overview
Weak permissions are common in third-party software and custom applications. Services typically run with SYSTEM privileges, making permission flaws a direct path to complete system control. Key vectors include file system ACLs, service permissions, unquoted paths, registry ACLs, and autorun binaries.
π§ Permissive File System ACLs
Service Binary Discovery
# Use SharpUp to identify vulnerable service binaries
.\SharpUp.exe audit
# Example output:
Name : SecurityService
DisplayName : PC Security Management Service
PathName : "C:\Program Files (x86)\PCProtect\SecurityService.exe"
State : Stopped
StartMode : AutoPermission Verification
# Check file permissions with icacls
icacls "C:\Program Files (x86)\PCProtect\SecurityService.exe"
# Vulnerable example:
C:\Program Files (x86)\PCProtect\SecurityService.exe BUILTIN\Users:(I)(F)
Everyone:(I)(F)
NT AUTHORITY\SYSTEM:(I)(F)
# (F) = Full Control for Users and EveryoneBinary Replacement Attack
π οΈ Weak Service Permissions
Service Permission Enumeration
Binary Path Modification Attack
Service Cleanup
π Unquoted Service Path
Path Discovery
Execution Order Analysis
π Permissive Registry ACLs
Registry Service Key Enumeration
Registry Modification Attack
π Modifiable Registry Autorun Binary
Autorun Program Discovery
Autorun Exploitation
π― HTB Academy Lab Solution
Lab Environment
Credentials:
htb-student:HTB_@cademy_stdnt!Access Method: RDP
Objective: Escalate privileges using weak permissions
Flag Location:
C:\Users\Administrator\Desktop\WeakPerms\flag.txt
Complete Walkthrough
π Alternative Techniques
PowerShell Service Enumeration
Manual Permission Checks
β οΈ Detection & Defense
Detection Indicators
Defensive Measures
π‘ Key Takeaways
Third-party software commonly has weak permissions
Service binaries are high-value targets (SYSTEM privileges)
Multiple attack vectors - files, services, registry, autorun
AccessChk and SharpUp are essential enumeration tools
Cleanup important to avoid detection and maintain operations
Weak permissions exploitation leverages misconfigurations in file systems, services, and registry to achieve privilege escalation.
Last updated