Registry Value Privilege Escalation
The registry value HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVersionExplorerUser Shell FoldersCommon Startup specifies the shared startup folder for all users on a system. This key is set to be writeable by any authenticated user. Therefore, any user could specify a folder with a shortcut to a program of their choice that will be run any time a user logs in, at the privilege level of that user. An example of this exploit is demonstrated by creating a batch file that adds a new user and adds them to the administrators group on a Domain Controller. This batch file is placed in the folder c:hackstartup and the registry value is set to 'c:hackstartup'. The next time an administrator logs on to that machine, the 'attacker' account will be created and added to the Administrators group on the PDC of the domain.