Binary Paths

Overview

Services sometimes have executables attached to them. If we have the right permissions to the service then we can change the binary path (executable file) to a malicious one.

Exploitation via Powershell

View services

Get-CimInstance -ClassName win32_service | Select Name,State,PathName | Where-Object {$_.State -like 'Running'}

View permissions

icacls "C:\xampp\apache\bin\mysqld.exe"
Mask
Permissions

F

Full access

M

Modify access

RX

Read and execute access

R

Read-only access

W

Write-only access

Replace service binary with malicious one then restart service

Get-CimInstance -ClassName win32_service | Select Name, StartMode | Where-Object {$_.Name -like 'mysql'}
net stop mysql
net start mysql
shutdown /r /t 0

Exploitation using PowerUp

Run PowerUp on machine

TCM Windows Priv Esc on Try Hack Me

Change the binary path

Start service

Exploitation via Accesschk64

Check for services with write permissions

TCM Windows Priv Esc on Try Hack Me
TCM Windows Priv Esc on Try Hack Me

Query the service

TCM Windows Priv Esc on Try Hack Me

Changing the binary path is the same as the last method

Last updated