| eG Monitoring |
|---|
|
Measures reported by ScrtySrvceChecksTest Services configured to use an executable with weak permissions are vulnerable to privilege escalation attacks. An unprivileged user could modify or overwrite the executable with arbitrary code, which would be executed the next time the service is started. Depending on the user that the service runs as, this could result in privilege escalation. This privilege escalation helps malicious attackers in elevating their privileges from initial access (typically, standard User or application account) to Administrator, root, or even full system access, on Windows referred to as NT Authority\System. Hence, it is very crucial to keep vigil on the Windows services, and alert administrators of any potential security threats. The ScrtySrvceChecksTest monitors the Windows service logs and tracks the number of recently installed programs and services. This test also reports the number of services that were disabled but are still found to be running. In addition, this test helps administrators to keep an eye on the number of Windows services with vulnerable permissions and unquoted Windows services. This way, administrators are promptly alerted to any possible malicious attacks and thus they can proactively eliminate any security threat before it leads to catastrophic outcome. Outputs of the test : One set of results for the Windows host being monitored. The measures made by this test are as follows:
|