#EQL to detect Local Privilege Escalation by unquoted service path: process where process_name:c\:\\program.* AND -process_name:c\:\\*\\* AND parent_name:services.exe AND user_name=="system" #threathunting
-
-
Replying to @SBousseaden @404death
Umm- that method do not work any more, as a normal user can only make folders in the root. In addition HIGH privelegie is needed to write to files.
2 replies 0 retweets 2 likes -
indeed, it's a "Backward compatibility" like detection
still can be abused on win10+ (with admin privs) to persist (without creating a new service) and also elevate IL from high to system if one find a vulnsvc1 reply 0 retweets 0 likes
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.