πWeak Permissions
π― Overview
π§ Permissive File System ACLs
Service Binary Discovery
# Use SharpUp to identify vulnerable service binaries
.\SharpUp.exe audit
# Example output:
Name : SecurityService
DisplayName : PC Security Management Service
PathName : "C:\Program Files (x86)\PCProtect\SecurityService.exe"
State : Stopped
StartMode : AutoPermission Verification
# Check file permissions with icacls
icacls "C:\Program Files (x86)\PCProtect\SecurityService.exe"
# Vulnerable example:
C:\Program Files (x86)\PCProtect\SecurityService.exe BUILTIN\Users:(I)(F)
Everyone:(I)(F)
NT AUTHORITY\SYSTEM:(I)(F)
# (F) = Full Control for Users and EveryoneBinary Replacement Attack
π οΈ Weak Service Permissions
Service Permission Enumeration
Binary Path Modification Attack
Service Cleanup
π Unquoted Service Path
Path Discovery
Execution Order Analysis
π Permissive Registry ACLs
Registry Service Key Enumeration
Registry Modification Attack
π Modifiable Registry Autorun Binary
Autorun Program Discovery
Autorun Exploitation
π― HTB Academy Lab Solution
Lab Environment
Complete Walkthrough
π Alternative Techniques
PowerShell Service Enumeration
Manual Permission Checks
β οΈ Detection & Defense
Detection Indicators
Defensive Measures
π‘ Key Takeaways
Last updated