{ "query": "Which technique involves replacing the Windows Sticky Keys executable with cmd.exe to obtain a SYSTEM shell at the logon screen?", "options": [ { "text": "DLL search order hijacking", "explanation": "This technique causes an application to load a malicious dynamic link library by exploiting the DLL search order.", "correct": false, "selected": false }, { "text": "Sticky Keys executable replacement", "explanation": "This method overwrites sethc.exe with cmd.exe so invoking Sticky Keys launches a SYSTEM command prompt.", "correct": true, "selected": false }, { "text": "Pass the hash attack", "explanation": "This attack uses captured hashed credentials to authenticate as a user without knowing the plaintext password.", "correct": false, "selected": false } ], "answer": "
The correct answer is Sticky Keys executable replacement.
This technique works by replacing the accessibility executable, for example Sticky Keys executable replacement typically means swapping C:\\Windows\\System32\\sethc.exe with cmd.exe so that when the Sticky Keys trigger is activated at the logon screen a command prompt runs with the Local System account privileges.
Because the executable is launched by the logon process the spawned shell inherits SYSTEM privileges and it therefore provides a full elevated command shell without interactive sign in. Replacing the file usually requires either administrative write access to the System32 folder or offline modification of the system image or registry hive.
DLL search order hijacking is incorrect because that technique abuses how Windows locates and loads DLLs for an application and it does not describe replacing the Sticky Keys executable to spawn cmd.exe at the logon screen.
Pass the hash attack is incorrect because that is a credential reuse technique that authenticates using an NTLM hash rather than a plaintext password and it does not involve substituting accessibility executables to obtain a SYSTEM shell at the logon screen.
", "batch_id": "46", "answerCode": "2", "type": "multiple-choice", "originalQuery": "Bendtner, a professional hacker, gained initial access to a remote system via a compromised user. To gain root-level access, he copied the file sethc.exe from %systemroot%\\system32 and the file cmd.exe to another location. Now, he restarted the system and pressed the Shift key 5 times to launch Command Prompt with system-level access.", "originalOptions": "A. Privilege escalation using Dylib hijackingWhen a question mentions replacing an accessibility executable at the logon screen think of Sticky Keys or utilman tricks and remember that this requires write access to System32 or offline modification to succeed.
", "references": [ "https://learn.microsoft.com/en-us/windows/accessibility/", "https://attack.mitre.org/techniques/T1546/009/", "https://www.hackingarticles.in/windows-sticky-keys-and-utilman-backdoor/" ], "video_url": "https://certificationation.com/videos/others/eccouncil/ethical-hacker/eccouncil-gained-initial-access-to-a-exam-585.html", "url": "https://certificationation.com/questions/others/eccouncil/ethical-hacker/eccouncil-gained-initial-access-to-a-exam-585.html" }