Windows Insecure file permissions

Privilege escalation techniques on Windows. Exploit insecure file permissions on services that run as NT Authority\SYSTEM.

List all running services

powershell
Get-WmiObject win32_service | Select-Object Name, State, PathName
 | Where-Object {$_.State -like 'Running'}

Check permission on a file

If interesting (custom) services, check if we can overwrite the executable. See Official Documentation for icacls.

  • F – Full access
  • M- Modify access
  • RX – Read and execute access
  • R – Read-only access
  • W – Write-only access
icacls "C:\Program Files\<some file>"