🔬UAC Bypass
Last updated
Was this helpful?
Last updated
Was this helpful?
🔬
Target IP:
10.4.19.119
UAC bypass
Some useful Win CMD commands
Determine the version information of the web server on port 80
The version can be checked in a browser by opening the link
http://10.4.19.119/
Set the target IP as GLOBAL RHOSTS variable
Use meterpreter
commands to gain more information about the target
Migrate current x86 meterpreter
session to a x64 process
Get admin
user privileges
Verify if admin
user is part of the local administrators group
In order to run programs or tasks with elevated privileges, UAC bypass is necessary
Generate a meterpreter
payload with msfvenom
Set up a new msfconsole
session and set up a listener with multi/handler
, to receive the connection one the payload is executed on the target
set the payload used with msfvenom
- the windows/meterpreter/reverse_tcp
one
set the LHOST IP and LPORT of the attack machine, based on the msfvenom
generated payload
The reverse_tcp handler
is listening and ready to receive the connection from the malicious payload
Head back in the meterpreter
session already opened
UAC would prevent running backdoor.exe
Run Akagi64.exe
executable with UACMe methor 23
Elevated meterpreter
session should be received on the listener
Migrate to a NT AUTHORITY\SYSTEM
service
📌 Privileges successfully elevated by bypassing UAC on a system running Windows 2012 R2.
Dump hashes to get the flag
executable is already present on the attack machine