Windows Privilege Escalation - Unquoted Service Paths

Поділитися
Вставка
  • Опубліковано 27 січ 2025

КОМЕНТАРІ • 25

  • @brianobey4368
    @brianobey4368 3 роки тому +4

    I've never bought a youtubers merch before. But I gotta get a shirt or something. Thanks for all the content homie.

  • @usamahussain1580
    @usamahussain1580 3 роки тому +3

    Alexis Ahmed ! Bro your content is very useful. Thanks for providing us with opportunity to learn without any cost.
    ❤️❤️❤️

  • @seunseun202
    @seunseun202 5 днів тому

    @6:00
    why check for privileges first?
    just copy your exe there and if there you are not allowed it will reject you.
    finding or downloading accesschk first seems time consuming?

  • @whoisPremier
    @whoisPremier 3 роки тому +1

    Great content per usual!

  • @XDGame34r99
    @XDGame34r99 2 роки тому

    Very informative video, thanks for your efforts.
    May you share your terminal configuration, I liked how it looks.👌

  • @mikewykes1624
    @mikewykes1624 3 роки тому +1

    Did you explain that the reason the exploit is named Common.exe is the next folder in the path was 'Common Files' - windows just appends .exe to the end of the folder name (when searching along the path) so when there is a space it just trys appending .exe to Common (the first part of the folder name) - hence the file name. Sorry if you did.....i missed it.

    • @joegrass721
      @joegrass721 3 роки тому

      You are right, he got that bit wrong. He seemed to be suggesting that Windows searches each folder for the executable name, but as you said it’s all about the space that follows the folder name

    • @HackerSploit
      @HackerSploit  3 роки тому

      Thank you for pointing this out, i had this in my notes and forgot to mention this.

    • @8080VB
      @8080VB 3 роки тому

      Oh man , i thought we can name our payload anything we want. . i was worried why this is not working. . , at the end i was able to figure it on my own .

  • @alexalderson5767
    @alexalderson5767 3 роки тому +1

    A very great video sir

  • @aspirohk3558
    @aspirohk3558 Рік тому

    What did you learn to have the prerequisites for all this

  • @taiquangong9912
    @taiquangong9912 2 роки тому

    @Hackersploit I have you book. Can this be used by a beginner? In your book for this section, it seems like I am missing a step. What protocol should be used to connect first to check for unquoted path, RDP??

  • @No-Salvation
    @No-Salvation 3 роки тому

    The vulnerability is the IP addresses and water is wet?

  • @CodeCraft-Mn
    @CodeCraft-Mn Місяць тому

    what about antivirus on windows?

  • @Anton2452r2n
    @Anton2452r2n 3 роки тому

    Are u using parrot os? I started to watch your playlist of ethical hacking, there u recomended using parrot os instead of kali linux, so should i use now parrot os? ar eu using now parrot os?

  • @konfushon
    @konfushon 3 роки тому +1

    Nothing important to say....just wanted to be among the first 10 people to comment 😂

  • @gamemorvikaxh
    @gamemorvikaxh 2 роки тому

    Nice video

  • @theethicalhadwani4091
    @theethicalhadwani4091 3 роки тому

    Since windows is used 98% of the time
    Does that mean In real life scenarios we would almost never encounter linux as privilege escalation vector?

    • @8080VB
      @8080VB 3 роки тому

      No linux can also be escalated .

  • @BitFitMits
    @BitFitMits 3 роки тому

    Yes!

  • @MrGFYne1337357
    @MrGFYne1337357 3 роки тому

    Notification squad