Skip to content

Hijack a SYSTEM service to drop a SYSTEM shell to the currently logged in user

License

Notifications You must be signed in to change notification settings

gquere/PwnService

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

2 Commits
 
 
 
 
 
 
 
 

Repository files navigation

PwnService

Rationale

During a recent penetration test I came accross a misconfigured Windows service running as SYSTEM. The rights of the binary spawned by the service were funky and allowed regular users to write to the file.

This example drops a shell with SYSTEM privileges to the currently logged in user. It does so by impersonating the SYSTEM token and starting a process within the user's session with said token. It's trickier than for instance adding a new user, changing an admin password or granting the current user admin rights, but I needed something stealthy that doesn't leave as much traces ;)

Licence

This repository is GPLv3. Refer to the LICENSE file for more information.

About

Hijack a SYSTEM service to drop a SYSTEM shell to the currently logged in user

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages