The Windows Registry is a hierarchical database that stores configuration settings and options. For privilege escalation, the registry can reveal credentials, misconfigurations, and persistence mechanisms.
Registry Hives
HKLM (Local Machine) contains system-wide settings. HKCU (Current User) contains user-specific settings. Both can hold valuable information.
Stored Credentials
AutoLogon passwords are stored in plaintext! This is a common finding in enterprise environments.
AutoRun Locations
Service Configuration
AlwaysInstallElevated
AlwaysInstallElevated
If both registry keys return 1, you can create a malicious MSI file that will install with SYSTEM privileges.
Knowledge Check
Key Takeaways
- AutoLogon credentials may be stored in plaintext in the registry
- Check VNC, PuTTY, and WinSCP for saved credentials
- AlwaysInstallElevated requires both HKLM and HKCU keys set
- AutoRun entries may point to writable binaries
- Use reg query to enumerate registry for passwords