Microsoft Windows AutoRuns Registry Hijack Possible Locations

This script is Copyright (C) 2013-2017 Tenable Network Security, Inc.

Synopsis :

Report common registry keys used to hijack execution.

Description :

Report common registry keys that can be used to hijack system process

These registry keys can be used to either replace execution or shim a
process in the middle of execution to hijack control. Confirm that
everything listed here is set to the appropriate settings and that it
doesn't look like another process is taking control of the process's

See also :

Solution :


Risk factor :


Family: Windows

Nessus Plugin ID: 70618 ()

Bugtraq ID:


Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now