Local Privilege Escalation
Last updated
Last updated
This attack involves replacing the service binary with a malicious version and restart the service.
This attack is similar to the "Service Binary Hijacking" but Instead of replacing the binary, it involves overwriting a DLL the binary uses.
Another method is to hijack the DLL search order.
This attack relies on windows find an executable path when it's Unquoted.
Windows Task Scheduler can execute automated tasks. This tasks can execute binary files and also scripts. Also, The scheduled tasks is running behalf on user.
Windows identifies users by generating an access token assigned to each user. This token contains information about the user's privileges. When a user runs a process or thread, the primary token is assigned, specifying the permissions for that process. A thread can also have an impersonation token assigned, which provides a different security context; in this case, the process will run based on the impersonation token instead of the primary token.