An auditor finds logs where a normal account opens a console file that triggers scripts with elevated rights. A Windows utility invokes these scripts through a custom setup. Which method is being used to run tasks with increased privileges while bypassing simple detection?
Executing hidden backups through a maintenance utility
Running a custom console file with hidden script references
Embedding scripts in a registry startup component
Configuring an SSH channel for remote file modification
Loading malicious references through a specialized console file takes advantage of the built-in console environment. This approach grants elevated privileges and conceals execution within a trusted tool. The other options involve unrelated paths or executables that do not leverage the console environment to escalate authority.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a console file and how can it trigger scripts?
Open an interactive chat with Bash
How does privilege escalation typically work in Windows environments?
Open an interactive chat with Bash
What are some ways to detect and prevent hidden script execution in Windows?