There's More than One Way to Trigger a Windows Service #1501
+161
−0
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
🤖 Automated Content Update
This PR was automatically generated by the HackTricks News Bot based on a technical blog post.
📝 Source Information
🎯 Content Summary
Scope and value
The post (Christopher Paschen, Oct 16, 2025) explains Windows Service Triggers—conditions that start services—and shows how red/blue teams can enumerate and activate them with little or no code. This matters because low-privileged users can indirectly start high-privileged built-in services (e.g., RemoteRegistry, WebClient, EFS), expanding attack surface when
SERVICE_STARTrights are not granted.Enumerating service triggers
• sc.exe...
🔧 Technical Details
Named pipe trigger to start privileged services: If a service has a Network Endpoint (Named Pipe) trigger, any client connection attempt to
\\.\pipe\<PipeName>will start it—even if it isn’t already listening. Low‑priv users can attempt a pipe open (e.g.,CreateFile) to force a high‑priv service to start and then interact with it.RPC endpoint trigger via Endpoint Mapper: Requesting the EPM for a target interface UUID causes the SCM to start the associated service so it can register its endpoint, after which the client connects. An RPC interface lookup alone can therefore boot a privileged service.
ETW‑based start (WebClient example): Services can auto‑start when specific ETW provider events are emitted. For WebClient, the provider
{22B6D684‑FA63‑4578‑87C9‑EFFCBE6643C7}(Microsoft‑Windows‑WebdavClient‑LookupServiceTrigger) starts the service upon matching events. Absent extra filters, any event from...🤖 Agent Actions
I analyzed the TrustedSec post and HackTricks and found there was no dedicated coverage of Windows Service Triggers (enumeration and activation). I added a new page and linked it from the right places.
What I updated/added:
Created a new page covering Service Triggers
Linked the new page from Windows LPE README under the Services section
Added Service Triggers to the Windows LPE checklist
Cross-linked from Named Pipe Client Impersonation page to Service Triggers page
References added at the end of the new page:
No other existing HackTricks pages covered enumeration/activation of Service Triggers (qtriggerinfo/TriggerInfo/WNF/ETW/Aggregate), so a new focused page was necessary, with proper cross-links into the Services section and related Named Pipe impersonation content.
This PR was automatically created by the HackTricks Feed Bot. Please review the changes carefully before merging.