windows-service-dll-abuse
OfficialEscalate privileges via Windows services.
Software Engineering#privilege escalation#windows#red teaming#active directory#dll hijacking#service exploitation
Authorblacklanternsecurity
Version1.0.0
Installs0
System Documentation
What problem does it solve?
This Skill helps penetration testers escalate privileges on Windows systems by exploiting common misconfigurations in services, such as unquoted paths and weak permissions, and by leveraging DLL hijacking techniques.
Core Features & Use Cases
- Service Enumeration: Identifies services with potential vulnerabilities like unquoted paths or weak ACLs.
- DLL Hijacking: Exploits Windows DLL search order to execute arbitrary code when a privileged process loads a DLL.
- Weak Permission Exploitation: Modifies service configurations or replaces binaries when write permissions are present.
- Use Case: A tester gains low-privilege access to a Windows machine and uses this Skill to find and exploit a misconfigured service to gain SYSTEM-level privileges.
Quick Start
Use the windows-service-dll-abuse skill to find and exploit unquoted service paths on the target system.
Dependency Matrix
Required Modules
accesschkscPowerUpProcess Monitoricaclsmingw
Components
scriptsreferences
💻 Claude Code Installation
Recommended: Let Claude install automatically. Simply copy and paste the text below to Claude Code.
Please help me install this Skill: Name: windows-service-dll-abuse Download link: https://github.com/blacklanternsecurity/red-run/archive/main.zip#windows-service-dll-abuse Please download this .zip file, extract it, and install it in the .claude/skills/ directory.
Agent Skills Search Helper
Install a tiny helper to your Agent, search and equip skill from 223,000+ vetted skills library on demand.