Exploitable Service Misconfigurations
Windows services can be misconfigured in several ways. Attackers can abuse the following conditions.
DLL Hijacking (IMP)
Occurs when a service loads DLLs from directories where attackers can write files.
Attackers places a malicious DLL in the load path, which gets executed under the context of the service.
Insecure Service Permissions (binPath Abuse)
Permissions on the service configuration (especially
binPath
) allow attackers to change what binary the service runs.
Service Registry Key Permissions
If attackers have write access to service registry keys (e.g.
NTLM\SYSTEM\CurrentControlSet\Services\ServiceName
). they can change the binary path.
Unquoted Service Path (IMP)
Services with paths that include spaces and are unquoted can be hijacked.
Example : Path =
C:\Program Files\Some Service\service.exe
MaliciousC:\Program.exe
can be executed instead.
Insecure File Permissions (Service Executable File Path)
If the binary a servce points to can be overwritten, the attacker can replace it with payload
Last updated