Path: blob/master/documentation/modules/exploit/windows/persistence/registry_userinit.md
36042 views
Vulnerable Application
This module will install a payload that is executed during user logon. It writes a payload executable to disk and modifies the Userinit registry value in "HKLM\Software\Microsoft\Windows NT\CurrentVersion\Winlogon" to append the payload path, causing it to execute when any user logs in.
Verification Steps
Start msfconsole
Obtain an administrator level meterpreter on Windows
Do:
use modules/exploits/windows/persistence/registry_userinitDo:
set session #Do:
runOn next user login, You should get a shell.
Options
PAYLOAD_NAME
Name of payload file to write. Random string as default.
Scenarios
Windows 10 1909 (10.0 Build 18363)
Initial admin shell
Install persistence
Logout, and log back in to trigger payload execution