We can also use scheduled tasks to establish persistence if needed. There are several ways to schedule the execution of a payload in Windows systems. Letโs look at some of them:
Task Scheduler
The most common way to schedule tasks is using the built-in Windows task scheduler. The task scheduler allows for granular control of when your task will start, allowing you to configure tasks that will activate at specific hours, repeat periodically or even trigger when specific system events occur. From the command line, you can use schtasks
to interact with the task scheduler. A complete reference for the command can be found on Microsoftโs website.
Letโs create a task that runs a reverse shell every single minute. In a real-world scenario, you wouldnโt want your payload to run so often, but we donโt want to wait too long for this room:
Note: Be sure to use THM-TaskBackdoor
as the name of your task, or you wonโt get the flag.
The previous command will create a โTHM-TaskBackdoorโ task and execute anย nc64
reverse shell back to the attacker. The /sc
and /mo
options indicate that the task should be run every single minute. The /ru
option indicates that the task will run with SYSTEM privileges.
To check if our task was successfully created, we can use the following command:
Making Our Task Invisible
Our task should be up and running by now, but if the compromised user tries to list its scheduled tasks, our backdoor will be noticeable. To further hide our scheduled task, we can make it invisible to any user in the system by deleting its Security Descriptor (SD). The security descriptor is simply an ACL that states which users have access to the scheduled task. If your user isnโt allowed to query a scheduled task, you wonโt be able to see it anymore, as Windows only shows you the tasks that you have permission to use. Deleting the SD is equivalent to disallowing all usersโ access to the scheduled task, including administrators.
The security descriptors of all scheduled tasks are stored in HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\
. You will find a registry key for every task, under which a value named โSDโ contains the security descriptor. You can only erase the value if you hold SYSTEM privileges.
To hide our task, letโs delete the SD value for the โTHM-TaskBackdoorโ task we created before. To do so, we will use psexec
(available in C:\tools
) to open Regedit with SYSTEM privileges:
We will then delete the security descriptor for our task:
If we try to query our service again, the system will tell us there is no such task:
If we start an nc listener in our attackerโs machine, we should get a shell back after a minute: