TTPwire Vol. 1 · MITRE ATT&CK·Tagged

← All stories

Black Hills InfoSec

Digging Deeper into Vulnerable Windows Services

BHIS · 2017-12-06 · Read original ↗

ATT&CK techniques detected

7 predictions
T1574.001DLL
99%
“##calation via insecure service without stop / restart permissions let ’ s consider another scenario that is similar to the first section of this write - up. in this scenario, however, let ’ s assume that you do not have the ability to stop or restart the service. this missing pe…”
T1574.001DLL
92%
“##ls, create blank files with the same names, and place them in c : \ vulnservice \ directory. dir c : \ windows \ system32 - filter “ *. dll ” | select - object name | foreach - object { $ str = \ ” c : \ \ vulnservice \ \ \ ” + $ _. name ; new - item - type file $ str } now, re…”
T1574.001DLL
92%
“will first look in their current folder for any necessary dlls. hardcore windows people, please correct me if i am wrong with the following statement : all windows programs will require at least one dll from the c : \ windows \ system32 folder if it is not included with the progr…”
T1218.004InstallUtil
85%
“such as using blank dll files to crash the service ). - you can restart the system - application whitelisting is enabled on the system in other words, you ’ ve run powerup or another local - privilege escalation script, you see a service is vulnerable, you can easily overwrite it…”
T1543.003Windows Service
60%
“digging deeper into vulnerable windows services digging deeper into vulnerable windows services privilege escalation is a common goal for threat actors after they have compromised a system. having elevated permissions can allow for tasks such as : extracting local password - hash…”
T1574.001DLL
53%
“tools to determine which dlls are loaded. there are some lists out there of commonly - used dlls and we ’ ve got ours narrowed down to about 15 or so. it will be released once we are satisfied … or we ’ ve grown bored of running random programs. we will point out that we mentione…”
T1569.002Service Execution
34%
“digging deeper into vulnerable windows services digging deeper into vulnerable windows services privilege escalation is a common goal for threat actors after they have compromised a system. having elevated permissions can allow for tasks such as : extracting local password - hash…”

Summary

Brian Fehrman // Privilege escalation is a common goal for threat actors after they have compromised a system. Having elevated permissions can allow for tasks such as: extracting local password-hashes, […]

The post Digging Deeper into Vulnerable Windows Services appeared first on Black Hills Information Security, Inc..