aboutsummaryrefslogtreecommitdiff
path: root/CodeExecution
diff options
context:
space:
mode:
authorsagishahar <sagishahar@gmail.com>2016-01-13 01:36:23 +0800
committersagishahar <sagishahar@gmail.com>2016-01-13 01:36:23 +0800
commit5f13c7b4deda82701d2834b8ef948a89d2e68074 (patch)
treeb1a9dbd1c8e4d33f0fbd2a76f8f759d912c0823b /CodeExecution
parent9e771d15bf19ab3c2ac196393c088ecdab6c9a73 (diff)
downloadPowerSploit-5f13c7b4deda82701d2834b8ef948a89d2e68074.tar.gz
PowerSploit-5f13c7b4deda82701d2834b8ef948a89d2e68074.zip
Add 'CanRestart' to output and Pester tests
Pester tests to the function 'Test-ServiceDaclPermission' were added in order to increase confidence in its reliability. In general, my intention was to replace the current functionality of the service management functions such as Invoke-ServiceStart, to not use blindly 'sc.exe start' but rather consult with the DACL permissions and base the decision on that. Unforunately, further investigation lead me to the conclusion that retrieval of the service's DACL permissions requires that an additional DACL permission (RC) be set. This may lead to an edge case that could miss a potential privilege escalation condition and thereby the original idea was discarded. Nonetheless, 'Test-ServiceDaclPermission' can be used for less critical tasks. Therefore, a 'CanRestart' property was added to the output of the service enumeration functions such as 'Get-ServiceUnquoted' as I think that it will add value to redteamers/pentesters by helping them prioritise which service should be abused for escalation of privileges. Services that can be restarted by a low privileged user will probably be prioritised first. Additionally, manual checking whether the vulnerable service can be restarted would not be required in most cases.
Diffstat (limited to 'CodeExecution')
0 files changed, 0 insertions, 0 deletions