Unquoted Service Paths

Overview

Unquotes service paths is similar to binary path exploitation, however the vulnerability lays in the fact that the path to the executable is unquoted.

When the service is started Windows looks through every word in the path separated with a space and test .exe

  • C:\Program.exe - NO

  • C:\Program Files.exe - NO

  • C:\Program Files\Unquoted.exe - NO

  • C:\Program Files\Unquoted Path.exe - NO

And so on...

Exploitation via PowerUp

Run PowerUp and search for Unquoted Service Paths section

TCM Windows Priv Esc Try Hack Me

Create and drop a malicious executable

Start a listener and the service

Last updated

Was this helpful?