Web Application Penetration Testing
Web Application Penetration Testing
Infrastructure Penetration Testing
API Security Testing
Mobile App Penetration Testing
Thick & Thin Client Testing
Phishing Simulation
Wireless Penetration Testing
Database Penetration Testing
OT Hacking
Radio Hacking
Red Team Exercise
Hardware Hacking
Blog

I am text block. Click edit button to change this text. Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Tools

Events

I am text block. Click edit button to change this text. Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Talks & Presentation

ATM & Kiosk Machine Hacking

Cybercrime va-user todayMay 24, 2020 325 105 4

Background
share close

At preemptive cyber security we have performed a number of projects where in the lab environment our customers have asked us to break into Kiosk machines. Following are some of the methods which can be handy to break out of restricted mode in the Windows environment.

Shell Protocols:

  • shell:::{20D04FE0-3AEA-1069-A2D8-08002B30309D}::{24ad3ad4-a569-4530-98e1-ab02f9417aa8}
  • Shell:Profile
  • Shell:ProgramFiles
  • Shell:System
  • Shell:ControlPanelFolder
  • Shell:Windows
  • shell:DocumentsLibrary
  • shell:Librariesshell:UserProfiles
  • shell:Personal
  • shell:SearchHomeFolder
  • shell:System shell:NetworkPlacesFolder
  • shell:SendTo
  • shell:Common Administrative Tools
  • shell:MyComputerFolder
  • shell:InternetFolder
  • shell:::{20D04FE0-3AEA-1069-A2D8-08002B30309D}::{A0953C92-50DC-43BF-BE83-3742FED03C9C}
  • shell:::{4234d49b-0245-4df3-b780-3893943456e1} = This one opens up the application folder
  • shell:::{20D04FE0-3AEA-1069-A2D8-08002B30309D}::{3ADD1653-EB32-4CB0-BBD7-DFA0ABB5ACCA}
  • shell:::{20D04FE0-3AEA-1069-A2D8-08002B30309D}::{374DE290-123F-4565-9164-39C4925E467B}
  • shell:::{20D04FE0-3AEA-1069-A2D8-08002B30309D}::{1CF1260C-4DD0-4EBB-811F-33C572699FDE}
  • shell:::{20D04FE0-3AEA-1069-A2D8-08002B30309D}::{B4BFCC3A-DB2C-424C-B029-7FE99A87C641}
  • shell:::{20D04FE0-3AEA-1069-A2D8-08002B30309D}::{088e3905-0323-4b02-9826-5d99428e115f}
  • shell:::{89D83576-6BD1-4C86-9454-BEB04E94C819}*
  • shell:::{018D5C66-4533-4307-9B53-224DE2ED1FE6}
  • shell:::{26EE0668-A00A-44D7-9371-BEB064C98683}\0::{15eae92e-f17a-4431-9f28-805e482dafd4}
  • shell:::{BD7A2E7B-21CB-41b2-A086-B309680C6B7E}*
  • shell:::{20D04FE0-3AEA-1069-A2D8-08002B30309D}::{d3162b92-9365-467a-956b-92703aca08af}

Folder Path Alternatives:

  • %USERPROFILE%
  • %PROGRAMDATA%
  • %PUBLIC%
  • %TMP%
  • %WINDIR%
  • %SYSTEMDRIVE%
  • %SYSTEMROOT%

Written by: va-user

Tagged as: , , , , , .

Rate it
Previous post

Similar posts

Post comments (0)

Leave a reply

Your email address will not be published. Required fields are marked *