0Day for all Windows (XP - Windows 10 - Server)

A security researcher from Colombia He discovered one way (0Day) to have administrator rights and boot persistence on every computer that uses Windows.

The surprising thing is that the technique was publicly released for the first time in December of 2017, but was never mentioned by the media despite its seriousness.

Also, this particular 0Day does not seem to have been taken into account by malware developers.

0Day was discovered by Sebastián Castro, a CSL security researcher. The exploit targets one of the parameters of Windows user accounts known as the Relative Identifier (RID).

RID is a code added to the end of each account's security identifier (SID from security identifier) ​​and describes the user rights. There are many RIDs available, but the most common are 501 for the standard guest account and 500 for administrator accounts.

Castro, with the help of CSL CEO Pedro García, discovered that the keys y store information for each Windows account. From there he could modify the RID associated with a particular account and grant it a different RID from the admins group.

The technique does not allow a hacker to remotely infect a computer unless it is exposed to the Internet without a password.

Of course we should mention that there are also cases where a hacker can access a system with someone . In case he gains access with single user rights, it is now very simple to become an administrator with full access to the Windows system.

Let's also mention that registry keys work immediately from boot persistence. Thus, all modifications made to the RID of accounts remain permanent until they are corrected.

Η επίθεση είναι πολύ αξιόπιστη. Δοκιμάστηκε και βρέθηκε ότι λειτουργεί άψογα σε όλες τις εκδόσεις των Windows από τα XP μέχρι τα Windows 10 και από τον 2003 μέχρι τον Server 2016. Θεωρητικά και οι παλαιότερες εκδόσεις θα πρέπει να είναι ευάλωτες.

"It is not so easy to detect the exploit, because this attack could be deployed using OS resources without causing any alert to the victim," Castro says.

We can discover the attack on RID by examining the [Windows] registry and checking for inconsistencies in SAM (Security Account Manager).

If the guest account's SID has a RID of 500, the guest account has administrator rights.

Also mention (without suggesting) that this particular exploit can help you get an administrator account on systems that have put you as a user.

______________

iGuRu.gr The Best Technology Site in Greecefgns

every publication, directly to your inbox

Join the 2.087 registrants.

Written by giorgos

George still wonders what he's doing here ...

Leave a reply

Your email address is not published. Required fields are mentioned with *

Your message will not be published if:
1. Contains insulting, defamatory, racist, offensive or inappropriate comments.
2. Causes harm to minors.
3. It interferes with the privacy and individual and social rights of other users.
4. Advertises products or services or websites.
5. Contains personal information (address, phone, etc.).