Leveraging Windows Services
Service Binary Hijacking
REMAKE
Get-CimInstance -ClassName win32_service | Select Name,State,PathName | Where-Object {$_.State -like 'Running'}icacls
Mask
Permissions
icacls "C:\xampp\apache\bin\httpd.exe"Get-CimInstance -ClassName win32_service | Select Name, StartMode | Where-Object {$_.Name -like 'mysql'}DLL Hijacking
Unquoted Service Path
Last updated