Unquoted service path vulnerability
Unquoted service path vulnerability
Enumeration with powerup.ps1
https://github.com/PowerShellMafia/PowerSploit/blob/master/Privesc/PowerUp.ps1upload the script with metasploit
upload /root/PowerSploit/Privesc/PowerUp.ps1
Now run the script with Powershell




• List services which can be configured 👍

We are also given the command to execute it.
• Unquoted Service Path 👍

Now create a reverse shell payload
Now upload the malicious file and changer meterpreter to shell, stop the service and then copy the file the same location, start listener at port 4443 and start the service again.

and we got the reverse shell

Last updated