Checklist

  • Insecure Service Permissions

  • Unquoted Service Path

    when you check service permission we will notice path of this service have spaces and doesn’t have any quotes

  • Weak Registry Permissions

  • Insecure Service Executables

  • AutoRuns

  • AlwaysInstallElevated

    any program will be run with system priv

  • Passwords - Registry

  • Passwords - Saved Creds

  • Passwords - Security Account Manager (SAM)

  • Passwords - Passing the Hash

  • Scheduled Tasks

  • Insecure GUI Apps

    exploit program run with admin priv

  • Startup Apps

    exploit Write privilege in startup folder to take the same privilege for logged user

  • SeImpersonatePrivilege

    exploit local service account - SeAssignPrimaryTokenPrivilege

  • SeImpersonatePrivilege - 0X1

    exploit local service account - SeImpersonatePrivilege

  • SeDebugPrivilege

  • SeTakeOwnershipPrivilege

    This privilege assigns WRITE_OWNER rights over an object, that’s meaning user can change owner in Security Descriptor for this object