Unquoted Service Paths
Overview
Unquotes service paths is similar to binary path exploitation, however the vulnerability lays in the fact that the path to the executable is unquoted.
When the service is started Windows looks through every word in the path separated with a space and test .exe
C:\Program.exe - NO
C:\Program Files.exe - NO
C:\Program Files\Unquoted.exe - NO
C:\Program Files\Unquoted Path.exe - NO
And so on...
Exploitation via PowerUp
Run PowerUp and search for Unquoted Service Paths section

Create and drop a malicious executable
Start a listener and the service
Last updated
Was this helpful?