This script is Copyright (C) 2013-2017 Tenable Network Security, Inc.
Report common registry keys used to hijack execution.
Report common registry keys that can be used to hijack system process
These registry keys can be used to either replace execution or shim a
process in the middle of execution to hijack control. Confirm that
everything listed here is set to the appropriate settings and that it
doesn't look like another process is taking control of the process's
See also :
Risk factor :
Get Nessus Professional to scan unlimited IPs, run compliance checks & moreBuy Nessus Professional Now