Leveraging Windows Services

Service Binary Hijacking

REMAKE

Get-CimInstance -ClassName win32_service | Select Name,State,PathName | Where-Object {$_.State -like 'Running'}

icacls

Mask
Permissions

F

Full access

M

Modify access

RX

Read and execute access

R

Read-only access

W

Write-only access

icacls "C:\xampp\apache\bin\httpd.exe"
Get-CimInstance -ClassName win32_service | Select Name, StartMode | Where-Object {$_.Name -like 'mysql'}

DLL Hijacking

Unquoted Service Path

Last updated

Was this helpful?