Leveraging Windows Services
π οΈ Service Binary Hijacking & DLL Hijacking Cheatsheet
π Enumerate Running Services and Their Executables
Get-CimInstance -ClassName Win32_Service |
Select-Object Name, State, PathName |
Where-Object { $_.State -like 'Running' }π Check Permissions on Service Binaries
icacls "C:\xampp\apache\bin\httpd.exe"π§Ύ ICACLS Permission Masks
Mask
Meaning
Description
βοΈ Check Startup Mode of a Specific Service
π― DLL Hijacking
β Unquoted Service Path
π Enumerate Unquoted Service Paths
β
Remediation Tips
Last updated