Skip to content

Latest commit

 

History

History
36 lines (23 loc) · 1.03 KB

powershell-profile-persistence.md

File metadata and controls

36 lines (23 loc) · 1.03 KB

Powershell Profile Persistence

It's possible to use powershell profiles for persistence and/or privilege escalation.

Execution

There are four places you can abuse the powershell profile, depending on the privileges you have:

$PROFILE | select *

Let's add the code to a $profile variable (that expands to the current user's profile file) that will get executed the next time the compromised user launches a powershell console:

{% code title="attacker@target" %}

echo "whoami > c:\temp\whoami.txt" > $PROFILE
cat $PROFILE

{% endcode %}

Once the compromised user launches powershell, our code gets executed:

{% hint style="warning" %} If the user is not using profiles, the technique will stick out immediately due to the "loading personal and system profiles..." message at the top. {% endhint %}

References

{% embed url="https://attack.mitre.org/techniques/T1504/" %}