Microsoft Windows AutoRuns Registry Hijack Possible Locations

This script is Copyright (C) 2013-2017 Tenable Network Security, Inc.


Synopsis :

Report common registry keys used to hijack execution.

Description :

Report common registry keys that can be used to hijack system process
execution.

These registry keys can be used to either replace execution or shim a
process in the middle of execution to hijack control. Confirm that
everything listed here is set to the appropriate settings and that it
doesn't look like another process is taking control of the process's
execution.

See also :

http://www.nessus.org/u?f2b0eb45
http://www.nessus.org/u?13554071

Solution :

n/a

Risk factor :

None

Family: Windows

Nessus Plugin ID: 70618 ()

Bugtraq ID:

CVE ID:

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now