Home page logo
/

basics logo Security Basics mailing list archives

[Full-disclosure] Privilege escalation on Windows using Binary Planting
From: Madhur Ahuja <ahuja.madhur () gmail com>
Date: Mon, 26 Sep 2011 00:01:09 +0530

Imagine a situation where I have a Windows system with the restricted
user access and want to get the Administrator access.

There are many services in Windows which run with SYSTEM account.

If there exists even one such service whose executable is not
protected by Windows File Protection, isn't it possible to execute
malicious code (such as gaining Administrator access) simply by
replacing the service executable with malicious one and then
restarting the service.

As a restricted user, what's stopping me to do this ?

Is there any integrity check performed by services.msc or service
itself before executing with SYSTEM account ?

Madhur

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

------------------------------------------------------------------------
Securing Apache Web Server with thawte Digital Certificate
In this guide we examine the importance of Apache-SSL and who needs an SSL certificate.  We look at how SSL works, how 
it benefits your company and how your customers can tell if a site is secure. You will find out how to test, purchase, 
install and use a thawte Digital Certificate on your Apache web server. Throughout, best practices for set-up are 
highlighted to help you ensure efficient ongoing management of your encryption keys and digital certificates.

http://www.dinclinx.com/Redirect.aspx?36;4175;25;1371;0;5;946;e13b6be442f727d1
------------------------------------------------------------------------


  By Date           By Thread  

Current thread:
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]