Windows Logon Helper
Last updated
Last updated
Winlogon.exe is a Windows component responsible for actions at logon/logoff as well as the secure attention sequence (SAS) triggered by Ctrl-Alt-Delete.
Commonly abused Winlogon registry keys and value for persistence are:
HKCU can also be replaced with HKLM for a system wide persistence, if you have admin privileges.
Let's run through the techqnique abusing the userinit
subkey.
Let's see what's currently held at the userinit
:
Let's now add an additional item shell.cmd (a simple reverse netcat shell) to the list that we want to be launched when the compromised machine reboots:
Rebooting the compromised system executes the c:\tools\shell.cmd, which in turn establishes a reverse shell to the attacking system: