πŸ”Weak Permissions

🎯 Overview

Weak permissions are common in third-party software and custom applications. Services typically run with SYSTEM privileges, making permission flaws a direct path to complete system control. Key vectors include file system ACLs, service permissions, unquoted paths, registry ACLs, and autorun binaries.

πŸ”§ Permissive File System ACLs

Service Binary Discovery

# Use SharpUp to identify vulnerable service binaries
.\SharpUp.exe audit

# Example output:
Name             : SecurityService
DisplayName      : PC Security Management Service
PathName         : "C:\Program Files (x86)\PCProtect\SecurityService.exe"
State            : Stopped
StartMode        : Auto

Permission Verification

# Check file permissions with icacls
icacls "C:\Program Files (x86)\PCProtect\SecurityService.exe"

# Vulnerable example:
C:\Program Files (x86)\PCProtect\SecurityService.exe BUILTIN\Users:(I)(F)
                                                     Everyone:(I)(F)
                                                     NT AUTHORITY\SYSTEM:(I)(F)
# (F) = Full Control for Users and Everyone

Binary Replacement Attack

πŸ› οΈ Weak Service Permissions

Service Permission Enumeration

Binary Path Modification Attack

Service Cleanup

πŸ“ Unquoted Service Path

Path Discovery

Execution Order Analysis

πŸ”‘ Permissive Registry ACLs

Registry Service Key Enumeration

Registry Modification Attack

πŸš€ Modifiable Registry Autorun Binary

Autorun Program Discovery

Autorun Exploitation

🎯 HTB Academy Lab Solution

Lab Environment

  • Credentials: htb-student:HTB_@cademy_stdnt!

  • Access Method: RDP

  • Objective: Escalate privileges using weak permissions

  • Flag Location: C:\Users\Administrator\Desktop\WeakPerms\flag.txt

Complete Walkthrough

πŸ”„ Alternative Techniques

PowerShell Service Enumeration

Manual Permission Checks

⚠️ Detection & Defense

Detection Indicators

Defensive Measures

πŸ’‘ Key Takeaways

  1. Third-party software commonly has weak permissions

  2. Service binaries are high-value targets (SYSTEM privileges)

  3. Multiple attack vectors - files, services, registry, autorun

  4. AccessChk and SharpUp are essential enumeration tools

  5. Cleanup important to avoid detection and maintain operations


Weak permissions exploitation leverages misconfigurations in file systems, services, and registry to achieve privilege escalation.

Last updated