ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 403 - PT0-002 discussion

Report
Export

A penetration tester enters a command into the shell and receives the following output:

C:\Users\UserX\Desktop>vmic service get name, pathname, displayname, startmode | findstr /i auto | findstr /i /v |C:\\Windows\\' I findstr /i /v''

VulnerableService Some Vulnerable Service C:\Program Files\A Subfolder\B Subfolder\SomeExecutable.exe Automatic

Which of the following types of vulnerabilities does this system contain?

A.
Unquoted service path
Answers
A.
Unquoted service path
B.
Writable services
Answers
B.
Writable services
C.
Clear text credentials
Answers
C.
Clear text credentials
D.
Insecure file/folder permissions
Answers
D.
Insecure file/folder permissions
Suggested answer: A

Explanation:

* The provided output reveals a common vulnerability in Windows services known as an unquoted service path. When the service executable path is not enclosed in quotes and contains spaces, Windows may incorrectly interpret the spaces, potentially leading to the execution of unintended programs.

* Details:

Command The command vmic service get name, pathname, displayname, startmode | findstr /i auto | findstr /i /v 'C:\\Windows\\' | findstr /i /v '' filters services that are set to start automatically and are not located in the Windows directory.

Output Interpretation: The output shows a service with a path C:\Program Files\A Subfolder\B Subfolder\SomeExecutable.exe which is not quoted. If a malicious user places an executable in C:\Program.exe, C:\Program Files\A.exe, or similar, it might get executed instead.

*

Reference: Common Windows privilege escalation vulnerabilities include unquoted service paths. This vulnerability is well-documented in security resources and penetration testing guides.

asked 02/10/2024
Claudia Arrais
49 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first