#EQL to detect Local Privilege Escalation by unquoted service path: process where process_name:c\:\\program.* AND -process_name:c\:\\*\\* AND parent_name:services.exe AND user_name=="system" #threathunting
-
-
Replying to @SBousseaden @404death
Umm- that method do not work any more, as a normal user can only make folders in the root. In addition HIGH privelegie is needed to write to files.
2 replies 0 retweets 2 likes
I have an idea for bypassing all that though I want to test next time I see it. The thing is....APPX reparse points can be set on folders alternative data streams- that will redirect execution to another exe. And a reparsepoint on an alternative data stream is effective on folder
9:26 AM - 26 Apr 2020
0 replies
0 retweets
3 likes
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.