• Still running Windows 7 or earlier? Support for Windows 7 ended on January 14th 2020. Please review the thread here for more details.

Exploit allows any application to run on top of Windows 7 login screen

JMH

Emeritus, Contributor
Joined
Apr 2, 2012
Posts
7,197
The exploit has been well documented for some time, but it might be a bit of a surprise to regular users just how easy it is to compromise a machine you have brief access to. An article published by Carnal0wnage writes about replacing "Sticky Keys" on the login screen for Windows 7 with the "command line" executable, which essentially could let a user make all hell break loose.

It's as simple as briefly gaining access to an elevated command prompt on a workstation and typing the following code;

REG ADD "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sethc.exe" /v Debugger /t REG_SZ /d "C:\windows\system32\cmd.exe"
http://www.neowin.net/news/exploit-...&utm_campaign=Feed:+neowin-main+(Neowin+News)
 
Requires physical access. One more reason to keep ones machine secure.

Or remote access provided admin rights can be gained, by, for example, exploiting a specific escalation of priveledge vulnerability in almost any application.
 
Last edited:
Another way to protect workstations is to disable registry edititng. That measure has been taken by the IT department here and keeps all sorts of mischief from happening.
 
12345
....Additionally, if the hack is in place, it's possible to perform a similar hack via RDP session. Once in place, it is virtually undetectable aside from the registry key. Essentially, the above code sets the debugger for Sticky Keys to the executable file for the command line applet, which is run at the system level when the machine is locked.

And I was thinking about doing this to lessen my login time! Guess not now!
 
Meh - anything that can escalate to admin can do anything on a box. Yet another reason to NOT log on with an admin account on a regular basis, and only use it for admin tasks. Any environment that wishes to be secure probably does this already (plus not allowing registry editing outside of a small admin group and certain service accounts as well), but yes - once you make someone an admin, the control of that box belongs to the person using it, and whatever they may happen to run on it. "Exploits" like this go all the way back to the beginning of NT (using at.exe to get a system-level cmd prompt, for instance).
 

Has Sysnative Forums helped you? Please consider donating to help us support the site!

Back
Top