Show Answer

 

The correct answer is B.

OBJ-3.7: Some Windows services are run with SYSTEM privileges and may have been misconfigured by the administrator. In this case, Jason used the accesschk tool from SysInternals to find any writeable services that his user account could access. One was returned: Apache. He then stopped the service and rewrote the binary path loaded by the service to “net localgroup administrators jason /add”, which will be run the next time the service is started. This will add Jason’s user account (jason) to the administrators group. Next, he started the service, completing his privilege escalation through the use of writeable services.

Hide Answer