EoP - Unquoted Service Paths
Unquoted Service Path Vulnerabilities: Identification and Exploitation
Key Concepts
Identifying Unquoted Service Paths
1. Using WMIC
cmdCopy codewmic service get name,displayname,pathname,startmode | findstr /i "Auto" | findstr /i /v "C:\Windows\"2. Using PowerShell
powershellCopy codeGet-WmiObject -Class Win32_Service |
Where-Object { $_.StartName -eq "LocalSystem" } |
Select-Object Name, DisplayName, PathName, StartMode |
Where-Object { $_.PathName -match " " }3. Using PowerUp
Exploiting Unquoted Service Paths
Manual Exploitation Steps
Example of Automatic Exploitation with PowerUp
Example of Exploitation Behavior
Exploiting with Metasploit
Mitigation Strategies
1. Quote Service Paths
2. Regular Audits
3. Use Least Privilege
4. Implement Security Policies
5. Monitoring and Alerts
Additional Resources
Last updated