Registry Autoruns
Windows can be configured to run commands at startup, with elevated privileges. These AutoRuns
are configured in the Registry
. If you are able to write
to an AutoRun executable, and are able to restart
the system (or wait for it to be restarted) you may be able to escalate privileges.
Enumeration
We are going to exploit registry AutoRuns to escalate our privileges to Admin
. Let’s check our current user.
Now, We will be using powerup.ps1
script to conduct an enumeration on the registry. Let’s import powerup.ps1
and execute Get-VulnAutoRun
to get the available executable that are vulnerables.
As you can see, program.exe
is vulnerable , which means we can replace it with our own reverse shell executable.
Let’s comfirm it with Get-Acl
command
Well..We have Full Control
on this executable. Which means we can be able to replace it other executable.
Exploitation
We are going replace program.exe
with our own reverse shell executable , which will be triggered whenever the system is restarted.
Well…for the purpose of demonstration, we will setup our reverse shell listener, restart the system and then login with admin
account.
Well…As you can see, we have obtained shell with Admin
privilege.