Registry Exploitation Techniques

Windows Registry-Based privilege escalation often involves misconfigured keys that can be modified by low-privileged users to execute malicious commands or binaries with elevated privileges. Two Common Attack paths include:

  • AlwaysInstallElevated - A setting that, if enabled in both machine and user scope, allows MSI packages to be installed with SYSTEM privileges.

  • Autorun Keys - Persistent registry keys that execute binaries during user logon or system startup.

Last updated