Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Invoke-FindDLLHijack - Differentiate between System and current user's path #23

Open
leechristensen opened this issue May 12, 2015 · 3 comments

Comments

@leechristensen
Copy link
Contributor

Currently, Invoke-FindDLLHijack does not differentiate between directories in the System path and directories in the current user's path. It'd be nice to be able to quickly determine if the hijack-able location is only in the current user's path since it affects whether or not the directory can be used for local privilege escalation.

@HarmJ0y
Copy link
Contributor

HarmJ0y commented May 18, 2015

There is a -ExcludeWindows flag as well as -ExcludeProgramFiles flag which will exclude all paths found from C:\Windows*, C:\Program Files* and C:\Program Files (x86)* . Are you thinking of a flag that filters just for the current user's directory path?

@leechristensen
Copy link
Contributor Author

Not necessarily a filter, just a way to differentiate between writable directories in the current user's path(HKCU\Environment\PATH) and the system path(HKLM\System\ControlSet001\Control\Session Manager\Environment\Path?). Only writable directories in the SYSTEM path can be used for local privilege escalation, whereas writable directories in the current user's path can potentially be used for persistence or horizontal privilege escalation (but not local privilege escalation).

@HarmJ0y
Copy link
Contributor

HarmJ0y commented Jun 5, 2015

Cool, will check back into this shortly!

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants