[ACCESSCHK]

Advanced permission auditing tool for Windows security assessments and privilege escalation analysis

Difficulty: Intermediate
Category: Security

Key Features

User Rights Analysis
Check user privileges and group memberships
Object Permissions
Audit file, registry, and service permissions
Vulnerability Scanning
Identify privilege escalation opportunities
Command Line Interface
Powerful scripting capabilities for automation

Basic Usage

User Rights and Privileges

# Check current user's privileges
accesschk -u

# Check specific user privileges
accesschk -u -c john

# Check if user can write to a service
accesschk -ucqv john Spooler

File and Directory Permissions

# Check directory permissions
accesschk -dqv "C:\\Program Files"

# Find writable directories
accesschk -uwdqs Users "C:\\Program Files"

# Check file permissions for specific user
accesschk -qv john "C:\\Windows\\System32\\config\\SAM"

Privilege Escalation Analysis

Service Vulnerabilities

# Find services writable by authenticated users
accesschk -uwcqv "Authenticated Users" *

# Check service permissions for Everyone group
accesschk -ucqv Everyone *

# Find unquoted service paths
accesschk -uwdq "C:\\Program Files (x86)"

Registry Analysis

# Check registry key permissions
accesschk -kqv HKLM\\SYSTEM\\CurrentControlSet\\Services

# Find writable registry keys
accesschk -kwus Users HKLM\\SOFTWARE

# Check auto-start registry locations
accesschk -kqv HKLM\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Run

Security Use Cases

๐Ÿ” Privilege Escalation

Identify paths for privilege escalation during security assessments.

# Find weak service permissions
accesschk -uwcqv "Users" *

๐Ÿ“‹ Compliance Auditing

Verify permissions align with security policies and compliance requirements.

# Audit sensitive directories
accesschk -dqv "C:\\Windows\\System32"

๐Ÿงช Penetration Testing

Enumerate attack paths and identify security weaknesses.

# Check current user access
accesschk -u -c %USERNAME%

๐Ÿ”ง System Hardening

Identify and remediate excessive permissions before deployment.

# Check Everyone group access
accesschk -uwdqs Everyone "C:\\"

Command Reference

OptionDescriptionExample
-uShow user rightsaccesschk -u john
-cCheck service permissionsaccesschk -ucqv john *
-dCheck directory permissionsaccesschk -dqv "C:\\temp"
-kCheck registry key permissionsaccesschk -kqv HKLM\\SOFTWARE
-wShow write access onlyaccesschk -uwdqs Users "C:\\"
-sRecurse subdirectoriesaccesschk -uwdqs Users "C:\\"

Best Practices & Tips

Run with appropriate privileges: Some checks require administrative rights for complete results
Focus on service vulnerabilities: Services with weak permissions are common escalation vectors
Check unquoted service paths: Combine with directory write permissions for exploitation
Automate with scripts: Create batch files for repeated security assessments

Get AccessChk

Download AccessChk as part of the Sysinternals Suite

Download AccessChk.exe