But you have to be an administrator in the first place to run this. If you are "normal user," you'll get "Access Denied."

t

----- Original Message ----- From: "James D. Stallard" <[EMAIL PROTECTED]> To: "'Harlan Carvey'" <[EMAIL PROTECTED]>; "'Nicolas RUFF'" <[EMAIL PROTECTED]>; "'Murda Mcloud'" <[EMAIL PROTECTED]>; "'Vic Brown'" <[EMAIL PROTECTED]>
Cc: <[email protected]>
Sent: Tuesday, April 17, 2007 8:29 AM
Subject: RE: Help with Exploit


Harlan, et al

To access the security regkeys in HKLM you don't need to change the ACLs.

This is an age-old (well, since early NT4 anyway) trick to get LOCALSYSTEM
privs on anything that allows you to run an AT job:

. Get the current time.
. From CMD line run "AT <time+1 minute> /interactive CMD.EXE".
. Wait for a minute.
. CMD window opens in LOCALSYSTEM context.
. Run REGEDIT from new CMD window.
. Navigate to HKLM\SECURITY.
. Marvel at now visible security keys: Cache, Policy, RXACT, SAM.

This particular trick is the basis for a deal of trivial priv escalation
attacks on windows, so if you can, you should secure the Task Scheduler with
a non-priv'ed user or disable it. Another good reason for not giving users
local admin rights.

Cheers

James

James D. Stallard, MIoD
Microsoft and Networks Infrastructure Technical Architect
Web: www.leafgrove.com
LinkedIn: www.linkedin.com/in/jamesdstallard
Skype: JamesDStallard






-----Original Message-----
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On
Behalf Of Harlan Carvey
Sent: 17 April 2007 14:40
To: Nicolas RUFF; Murda Mcloud; 'Vic Brown'
Cc: [email protected]
Subject: Re: Help with Exploit


> I've done some googling and am finding that the
new RR version  checks the
> security hive(which I believe to be 'invisible' to
regedit-can someone
> correct me if I'm wrong?).

On a live system, the Security hive is not accessible by default. You need
to change the ACLs so that the Admin has the ability to read the hive.

I know I am coming late on this one, but registry keys that contain
NULL characters cannot be accessed through REGEDIT. You have to rely
on the low-level NTDLL API to access them. It is known "copy
protection" trick :)

What?


------------------------------------------
Harlan Carvey, CISSP
author: "Windows Forensic Analysis"
http://windowsir.blogspot.com
------------------------------------------






Reply via email to