Unquoted service path vulnerability

Unquoted service path vulnerability

Enumeration with powerup.ps1

https://github.com/PowerShellMafia/PowerSploit/blob/master/Privesc/PowerUp.ps1

upload the script with metasploit

upload /root/PowerSploit/Privesc/PowerUp.ps1

Now run the script with Powershell

• List services which can be configured 👍

We are also given the command to execute it.

• Unquoted Service Path 👍

Now create a reverse shell payload

using reverse meterpreter payload dies if used and we have to chain it with post/windows/manage/migrate

Now upload the malicious file and changer meterpreter to shell, stop the service and then copy the file the same location, start listener at port 4443 and start the service again.

and we got the reverse shell

Last updated