Service Exploits
Windows Privilege Escalation Cheat Sheet – Service Exploits
Service exploits are very likely to come up in your OSCP exam.
This can include things like insecure file permissions and unquoted service path’s, amongst others.
This should probably be your biggest area of focus for Windows priv esc before your exam.
Insecure service permissions
Run winPEAS to check whether you can change the configuration of a service or not:
Can you modify the service?
What does the service do? Can your user restart it?
What is the current state of the service?
Can you set a new binary path for the service?
If so, download a reverse shell payload to your target and set a new path:
Set up a Netcat listener:
Start or restart the service:
You might need to stop the service first:
Offensive Security might try to be sneaky and disable your ability to start or restart a service.
You can, however, get around this by restarting the machine (if the service autoruns on startup):
Last updated
Was this helpful?