Windows Escalate UAC Protection Bypass

Discussion in 'News Aggregator' started by Packet Storm, 2 Dec 2016.

  1. Packet Storm

    Packet Storm Guest

    This Metasploit module will bypass Windows UAC by hijacking a special key in the Registry under the current user hive, and inserting a custom command that will get invoked when the Windows Event Viewer is launched. It will spawn a second shell that has the UAC flag turned off. This Metasploit module modifies a registry key, but cleans up the key once the payload has been invoked. The module does not require the architecture of the payload to match the OS. If specifying EXE::Custom your DLL should call ExitProcess() after starting your payload in a separate process.

    Continue reading...
     

Share This Page

Loading...