🔬UAC Bypass

Lab 1

🔬 UAC Bypass: UACMe

  • Target IP: 10.4.19.119

  • UAC bypass

  • Some useful Win CMD commands

net user
net localgroup administrators

Enumeration

nmap 10.4.19.119
PORT      STATE SERVICE
80/tcp    open  http
135/tcp   open  msrpc
139/tcp   open  netbios-ssn
445/tcp   open  microsoft-ds
3389/tcp  open  ms-wbt-server
49152/tcp open  unknown
49153/tcp open  unknown
49154/tcp open  unknown
49155/tcp open  unknown
49175/tcp open  unknown
  • Determine the version information of the web server on port 80

nmap port 80
  • The version can be checked in a browser by opening the link

    • http://10.4.19.119/

Exploitation

  • Set the target IP as GLOBAL RHOSTS variable

Metasploit rejetto_hfs_exec
  • Use meterpreter commands to gain more information about the target

  • Migrate current x86 meterpreter session to a x64 process

  • Get admin user privileges

  • Verify if admin user is part of the local administrators group

  • In order to run programs or tasks with elevated privileges, UAC bypass is necessary

UAC Bypass & Privesc

  • UACMe Akagi executable is already present on the attack machine

  • Generate a meterpreter payload with msfvenom

  • Set up a new msfconsole session and set up a listener with multi/handler, to receive the connection one the payload is executed on the target

    • set the payload used with msfvenom - the windows/meterpreter/reverse_tcp one

    • set the LHOST IP and LPORT of the attack machine, based on the msfvenom generated payload

  • The reverse_tcp handler is listening and ready to receive the connection from the malicious payload

  • Head back in the meterpreter session already opened

  • UAC would prevent running backdoor.exe

  • Run Akagi64.exe executable with UACMe methor 23

Akagi64.exe
  • Elevated meterpreter session should be received on the listener

Elevated Mterpreter session received
  • Migrate to a NT AUTHORITY\SYSTEM service

📌 Privileges successfully elevated by bypassing UAC on a system running Windows 2012 R2.

  • Dump hashes to get the flag

Reveal Flag - admin NTLM Hash is: 🚩

4d6583ed4cef81c2f2ac3c88fc5f3da6


Last updated

Was this helpful?