CAPEC 478 Modification of Windows Service Configuration

Usable Detailed Low Risk
Severity High

Description

An adversary exploits a weakness in access control to modify the execution parameters of a Windows service. The goal of this attack is to execute a malicious binary in place of an existing service.

Attack Execution Flow

3

Mitigations

1

Consequences

Relationships

Related ATT&CK Techniques

2

Resources Required

1