🔬UAC Bypass
Lab 1
Target IP:
10.4.19.119
UAC bypass
Some useful Win CMD commands
Enumeration
Determine the version information of the web server on port
80
The version can be checked in a browser by opening the link
http://10.4.19.119/
Exploitation
Set the target IP as GLOBAL RHOSTS variable
Use
meterpreter
commands to gain more information about the target
Migrate current x86
meterpreter
session to a x64 process
Get
admin
user privileges
Verify if
admin
user is part of the local administrators group
In order to run programs or tasks with elevated privileges, UAC bypass is necessary
UAC Bypass & Privesc
UACMe Akagi executable is already present on the attack machine
Generate a
meterpreter
payload withmsfvenom
Set up a new
msfconsole
session and set up a listener withmulti/handler
, to receive the connection one the payload is executed on the targetset the payload used with
msfvenom
- thewindows/meterpreter/reverse_tcp
oneset the LHOST IP and LPORT of the attack machine, based on the
msfvenom
generated payload
The
reverse_tcp handler
is listening and ready to receive the connection from the malicious payloadHead back in the
meterpreter
session already opened
UAC would prevent running
backdoor.exe
Run
Akagi64.exe
executable with UACMe methor 23
Elevated
meterpreter
session should be received on the listener
Migrate to a
NT AUTHORITY\SYSTEM
service
📌 Privileges successfully elevated by bypassing UAC on a system running Windows 2012 R2.
Dump hashes to get the flag
Last updated