Unsecure Path security
Check file access:
accesschk.exe -accepteula -wvs "Authenticate Users" C:\*.* > C:\fld-usr.txt
accesschk.exe -accepteula -wvs "Users" C:\*.* > C:\fld-usr.txt
Check for applications that are in path; that we can edit/ RW - maybe backdoor the application so when executed will execute implant also :)
Check Paths:
reg query "HKLM\SYSTEM\CurrentControlSet\Control\Session Manager\Environment"
and look for path variables. Look for files that appear attractive then check you can write to them:
icacls PATH
if you can write, put your implant in the path as a program
Missing Binaries:
can run gui version and perform both autorunsc64.exe check as they are highlighted in yellow on the tool.
service:
check for misconfigured/missing service binaries:
autorunsc64.exe -a s | more
look for file not found, then also check for the service using, and that you can write to the path:
sc query SERVICE
icacls SERVICE_EXE_PATH
Tasks:
check for misconfigured/missing tasks:
autorunsc64.exe -a t | more
look for file not found, then also check for the service using, and that you can write to the path:
schtasks /query /tn TASK /xml
icacls SERVICE_EXE_PA
check for integrity level / user SID and trigger. Sid translate:
wmic useraccount where sid='SIDMNUMER' get name
Last updated