Startup Apps
Each user can define apps that start when they log in, by placing shortcuts to them in a specific directory. Windows also has a startup directory for apps that should start for all users: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp
If we can create
files in this directory, we can use our reverse shell executable and escalate privileges when an admin logs in
.
Enumeration
We are going to exploit Startup Apps to escalate our privileges to Admin
. Let’s check our current user.
Now, We will use Get-Acl
in powershell to conduct an enumeration on the startup directory
.
Well..We have Full Control
on startup directory. Which means we can be able to place our own reverse shell executable, so that if anyone logins i.e admin
, we will obtain his shell.
Exploitation
We are going copy our reverse shell executable to the startup directory.
Well…for the purpose of demonstration, we will setup our reverse shell listener, restart the system and then login with admin
account.
Well…As you can see, we have obtained shell with Admin
privilege.