User Account Control (UAC) Bypass
User Account Control (UAC) Bypass
Theory and examples
INTEGRITY LEVELS (IL)
Low = Generally used for interaction with the Internet. Has very limited permissions.
Medium = Assigned to standard users and Administrators' filtered tokens.
High = Used by Administrators' elevated tokens if UAC is disabled. All administrators will always use a high IL token.
System = Reserved for system use.
FILTERED TOKENS
Non-administrators: Will receive a single access token when logged in, which will be used for all tasks performed by the user. This token has Medium IL.
Administrators: Filtered token = A token with Administrator privileges stripped, used for regular operations. This token has Medium IL.
Elevated Token = Full admin privileges. High IL.
EventViewer
1) Upload and import the module
2) Run it
ComputerDefaults
1)
2)
3)
4)
Obfuscated UAC Bypass
1) Prepare the command to be executed
2) Encode your command
3) Insert the Base64 blob into the code variable
4) Create the Bypass function
5) Execute the code
GUI-BASED UAC BYPASS
msconfig
azman.msc
AUTOMATION
Tool: UACMEAkagi64.exe
AUTO-ELEVATE
Verification
FODHELPER
BYPASS DEFENDER WITH FODHELPER
IMPROVED FODHELPER EXPLOIT
DISK CLEANUP SCHEDULED TASK
Last updated