User Account Control (UAC) Bypass
Microsoft introduced User Account Control (UAC) in Windows Vista and refined it in Windows 7. UAC works a lot like sudo in UNIX. Day-to-day a user works with normal privileges. When the user needs to perform a privileged action—the system asks if they would like to elevate their rights.
Cobalt Strike ships with a few UAC bypass attacks. These attacks will not work if the current user is not an Administrator. To check if the current user is in the Administrators group, use run whoami /groups.
1) elevate uac-token-duplication [LISTENER]
2) runasadmin uac-token-duplication [COMMAND]
3) runasadmin uac-cmstplua [COMMAND]
Last updated