What technique allows attackers to inject malicious code directly from the Windows registry through a legitimate system process, bypassing UAC and other controls?

Prepare for the Certified Ethical Hacker Version 11 Exam with a comprehensive test featuring flashcards and multiple choice questions, each accompanied by hints and explanations to ensure a thorough understanding. Ace your ethical hacking exam with confidence!

Multiple Choice

What technique allows attackers to inject malicious code directly from the Windows registry through a legitimate system process, bypassing UAC and other controls?

Explanation:
This technique centers on using the Windows registry to hijack how a legitimate system process runs code. By editing registry keys that control startup and loaded components, an attacker can point a trusted process to execute malicious code or load a malicious DLL. Because the code runs within a trusted, legitimate process, it inherits that process’s privileges, which often means no UAC prompt or other user-facing controls appear. This makes the attack stealthy and effective for persistence, since the malicious code is triggered by configurations the system already trusts. For example, registry keys that auto-launch programs at logon or modify where a process looks for its components can be abused to have Windows execute attacker-controlled code whenever the process starts. This contrasts with memory code injection, which happens inside a running process’s memory rather than through registry-driven startup or load paths. It also helps explain why a broad label like malware persistence is less precise than identifying the registry-based hijacking technique. Legitimate applications isn’t an attack method at all.

This technique centers on using the Windows registry to hijack how a legitimate system process runs code. By editing registry keys that control startup and loaded components, an attacker can point a trusted process to execute malicious code or load a malicious DLL. Because the code runs within a trusted, legitimate process, it inherits that process’s privileges, which often means no UAC prompt or other user-facing controls appear. This makes the attack stealthy and effective for persistence, since the malicious code is triggered by configurations the system already trusts.

For example, registry keys that auto-launch programs at logon or modify where a process looks for its components can be abused to have Windows execute attacker-controlled code whenever the process starts. This contrasts with memory code injection, which happens inside a running process’s memory rather than through registry-driven startup or load paths. It also helps explain why a broad label like malware persistence is less precise than identifying the registry-based hijacking technique. Legitimate applications isn’t an attack method at all.

Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy