{"id":19836,"date":"2021-05-11T00:12:00","date_gmt":"2021-05-10T22:12:00","guid":{"rendered":"http:\/\/159.69.82.204\/win\/?p=19836"},"modified":"2022-09-04T22:12:56","modified_gmt":"2022-09-04T20:12:56","slug":"windows-versteckte-benutzerkonten-anlegen-und-aufspren","status":"publish","type":"post","link":"https:\/\/borncity.com\/win\/2021\/05\/11\/windows-versteckte-benutzerkonten-anlegen-und-aufspren\/","title":{"rendered":"Windows: Create and detect hidden user accounts"},"content":{"rendered":"<p><img decoding=\"async\" style=\"float: left; margin: 0px 10px 0px 0px; display: inline;\" title=\"Windows\" src=\"https:\/\/www.borncity.com\/blog\/wp-content\/uploads\/2021\/04\/Windows-klein.jpg\" alt=\"Windows\" width=\"200\" \/>[<a href=\"https:\/\/www.borncity.com\/blog\/?p=252968\" target=\"_blank\" rel=\"noopener\">German<\/a>]Today a short article about a security topic I recently came across by chance. It's about the possibility to create hidden but active user accounts under Windows via net user command. This ability is increasingly being exploited by malware to set up a possible backdoor in the system.<\/p>\n<p><!--more--><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/vg01.met.vgwort.de\/na\/84617bc3c4d94b6080a4e1ce6474769a\" alt=\"\" width=\"1\" height=\"1\" \/>I became aware of the issue, which is covered in more detail in <a href=\"https:\/\/web.archive.org\/web\/20220331070125\/https:\/\/chaah.awankloud.my\/redteaming-tips-creating-a-hidden-user\/\" target=\"_blank\" rel=\"noopener\">this post<\/a>, on Twitter the other day via the following <a href=\"https:\/\/twitter.com\/_r_netsec\/status\/1387696433948725248\" target=\"_blank\" rel=\"noopener\">tweet<\/a>.<\/p>\n<p><img decoding=\"async\" title=\"Create a hidden Windows user\" src=\"https:\/\/i.imgur.com\/orRiBjY.png\" alt=\"Create a hidden Windows user\" \/><\/p>\n<p>In an administrative command prompt window it is possible to list the created users of a Windows machine with a <em>net user <\/em>command. This is demonstrated in the following screenshot. The command apparently lists everything, even the disabled accounts (here <em>WDAGUtilityAccount,<\/em> that do not show up in the user account management of the control panel).<\/p>\n<p><img decoding=\"async\" title=\"Windows: hidden user account\" src=\"https:\/\/i.imgur.com\/5KecmP3.png\" alt=\"Windows: hidden user account\" \/><\/p>\n<p>But this is only half the truth, as will become clear in the other commands I used in the above example. With:<\/p>\n<p>net user \/add name password<\/p>\n<p>a new user account can be created using the <em>net user c<\/em>ommand. If a $ sign is appended to the user account name, this creates a hidden user account. In the example above I used the command:<\/p>\n<p>net user \/add evilborn$ evilpassword<\/p>\n<p>to create a user with the name <em>evilborn$<\/em>. However, this very user account does not show up in the listing of user accounts when the <em>net user<\/em> command is subsequently typed. But the account exists, because the command:<\/p>\n<p>net user evilborn$<\/p>\n<p>isplays the following output at the command prompt window.<\/p>\n<p><img decoding=\"async\" title=\"Hidden Windows User Account\" src=\"https:\/\/i.imgur.com\/EmbmWof.png\" alt=\"Hidden Windows User Account\" \/><\/p>\n<p>So if someone scans a system for compromised user accounts, he would not see exactly this user account via <em>net user<\/em>. On the other hand, if you go to the Control Panel and look at the list of user accounts, the hidden (but active) user account is displayed.<\/p>\n<p><img decoding=\"async\" title=\"Windows User Accounts\" src=\"https:\/\/i.imgur.com\/rQgzejB.png\" alt=\"Windows User Accounts\" \/><\/p>\n<p>However, no disabled accounts, such as the <em>WDAGUtilityAccount <\/em>entry mentioned above, are listed there. This is something to be aware of when inspecting a system for any user accounts that may exist. In the business environment, however, one will use Computer Management to inspect user accounts.<\/p>\n<p><img decoding=\"async\" title=\"Windows User Accounts\" src=\"https:\/\/i.imgur.com\/t34mxdQ.png\" alt=\"Windows User Accounts\" \/><\/p>\n<p>The hidden user account is also displayed there. In the Windows Home variants the command:<\/p>\n<p><em>control.exe userpasswords2<\/em><\/p>\n<p>could be used. Then the list of active user accounts is also displayed, with the hidden user listed as well.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[German]Today a short article about a security topic I recently came across by chance. It's about the possibility to create hidden but active user accounts under Windows via net user command. This ability is increasingly being exploited by malware to &hellip; <a href=\"https:\/\/borncity.com\/win\/2021\/05\/11\/windows-versteckte-benutzerkonten-anlegen-und-aufspren\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[580,2],"tags":[69,194],"class_list":["post-19836","post","type-post","status-publish","format-standard","hentry","category-security","category-windows","tag-security","tag-windows"],"_links":{"self":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/19836","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/comments?post=19836"}],"version-history":[{"count":0,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/19836\/revisions"}],"wp:attachment":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/media?parent=19836"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/categories?post=19836"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/tags?post=19836"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}