githubEdit

User Account Control (UAC) Bypass

User Account Control (UAC) Bypass

Theory and examples

INTEGRITY LEVELS (IL)

Low = Generally used for interaction with the Internet. Has very limited permissions.

Medium = Assigned to standard users and Administrators' filtered tokens.

High = Used by Administrators' elevated tokens if UAC is disabled. All administrators will always use a high IL token.

System = Reserved for system use.

FILTERED TOKENS

Non-administrators: Will receive a single access token when logged in, which will be used for all tasks performed by the user. This token has Medium IL.

Administrators: Filtered token = A token with Administrator privileges stripped, used for regular operations. This token has Medium IL.

Elevated Token = Full admin privileges. High IL.

EventViewer

Link: https://github.com/CsEnox/EventViewer-UACBypass

1) Upload and import the module

2) Run it

ComputerDefaults

1)

2)

3)

4)

Obfuscated UAC Bypass

Link: https://github.com/I-Am-Jakoby/PowerShell-for-Hackers/blob/main/Functions/UAC-Bypass.md

1) Prepare the command to be executed

2) Encode your command

3) Insert the Base64 blob into the code variable

4) Create the Bypass function

5) Execute the code

GUI-BASED UAC BYPASS

msconfig

1) Run

2) msconfig

3) System Configuration -> Tools

4) Launch cmd.exe

azman.msc

1) Run

2) azman.msc

3) Authorization Manager -> Help -> Help Topics

4) Right-click -> View Source (Spawns notepad process)

5) File -> Open

6) All files

7) Search cmd.exe

8) Open cmd.exe

AUTOMATION

Tool: UACMEAkagi64.exe

options:

33 = fodhelper.exe

34 Disk Cleanup scheduled Task

70 fodhelper.exe using CurVer registry key

AUTO-ELEVATE

Verification

FODHELPER

1)

2)

3)

4)

5)

6)

7)

8) Attacker:

9)

10)

BYPASS DEFENDER WITH FODHELPER

1)

2)

3)

4)

5)

IMPROVED FODHELPER EXPLOIT

1)

2)

3)

4)

5)

6)

DISK CLEANUP SCHEDULED TASK

1)

2)

3)

4)

Last updated