Windows Privilege Escalation Unquoted Service - Part 1

G9yn3qNq7Vw/default.jpg

In part 1 of this three part series I'll show you how to escalate Windows privileges by attacking unquoted service. I'll show you how to locate unquoted services to attack.

Registry Location: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services

Command:
wmic service get name,pathname,startmode |findstr /i /v "C:\Windows\\" |findstr /i /v """

G9yn3qNq7Vw/default.jpg
Windows Privilege Escalation Unquoted Service - Part 1 Windows Privilege Escalation Unquoted Service - Part 1 Reviewed by Anonymous on April 18, 2018 Rating: 5