• We just launched and are currently in beta. Join us as we build and grow the community.

windows 10 uac bypass | disable uac windows 10

quadrado51

Market Demand Exploiter
Q Rep
0
0
0
Rep
0
Q Vouches
0
0
0
Vouches
0
Posts
75
Likes
107
Bits
2 MONTHS
2 2 MONTHS OF SERVICE
LEVEL 1 400 XP
Cityscape-Listing-Presentation-1.png


Hey Folks, in this tutorial we will discuss the working methods through which we can bypass (UAC) user account control enforcement facility of the window machine and get administrative level privileges. We will discuss about UAC before jumping straight to the methods of exploitation.

UAC ( User Account Control )

User Account Control is a mandatory access control enforcement facility of the window machine that helps to prevent malware from damaging a PC. They are typically marked by a security shield icon with the 4 colors of the Windows logo. Letā€™s talk about the tasks that we can do after get administrator privileges.

  • Running an Application as an Administrator
  • Changes to system-wide settings
  • Installing and uninstalling applications
  • Installing device drivers
  • Changing settings for Windows Firewall
  • Adding or removing user accounts
  • Changing a userā€™s account name or type
  • Change Registry Values
  • More ā€¦

As you can see above how many unwanted actions we can take after getting administrator privileges, hence in this tutorial we will tell you about all the possible ways through which we can easily bypass UAC (User Account Control) and get administrator privileges.

Lets take a look šŸ˜› !!

Compromised

As you can see that we have already compromised to the victim machine ( window 10 ). If you want to know about the complete process of taking a meterpreter session of the victim machine then you can click here.

1-11.png

Privileges

You can see in the image below that we have a meterpreter session but without much privilege. Letā€™s try to get admin access along with metasploit modules.

getprivs
getuid12getprivsgetuid

2-11.png

Bypass Window 10 UAC via Fodhelper

This module will bypass Windows 10 UAC by hijacking a special key in the Registry under the current user hive, and inserting a custom command that will get invoked when the Windows fodhelper.exe application is launched. All you have to do is change the session ID and execute all the commands. After doing this the meterpreter session will come as you can in the image below. Letā€™s see whether the meterpreter has comes with admin privileges or not.

3-11.png


Great šŸ˜› !! After executing the command ā€œgetprivsā€ we noticed that our privileges have increased compared to the initiative which means itā€™s work for window (10) machine.

4-11.png

Bypass Window 10 UAC via Silentcleanup

Basically thereā€™s a task in the Windows Task Scheduler called ā€œSilentCleanupā€ which, while itā€™s executed as Users, automatically runs with elevated privileges. When it runs, it executes the file %windir%\system32\cleanmgr.exe. Since it runs as Users, and we can control userā€™s environment variables, %windir% (normally pointing to C:\Windows) can be changed to point to whatever we want, and itā€™ll run as admin. To run this module just you need to execute the following command but make sure change the session id.

use exploit/windows/local/bypassuac_silentcleanup
set session < id >
run123useexploit/windows/local/bypassuac_silentcleanupset session<id>run

5-12.png

Check Privileges

Done šŸ˜› !! After executing the above the module, we get an meterpreter session along with admin rights which you can check through ā€œgetprivsā€ command.

6-12.png

Bypass Window 10 UAC via RunAs

This module will attempt to elevate execution level using the ShellExecute undocumented RunAs flag to bypass low UAC settings.
After receiving the victim machineā€™s meterpreter session then all you need to do is execute the given command on multi handler of metasploit but make sure change the session ID that you got.

use exploit/windows/local/ask
set session < id >
run123useexploit/windows/local/askset session<id>run

7-11.png


Wait šŸ™‚ !! After executing the above module, a (UAC) security prompt will pop up on the target machine asking for yes or no and if the victim allows us by clicking yes then we get all the admin rights otherwise the module will give an error or fail message but after that we have to continuously execute the above module so that the victim can click on the Yes option.

8-10.png


Good šŸ˜› !! But after the victim clicks on the Yes option, we get another meterpreter session of the victim machine. Letā€™s see if it works or nor ?

9-7.png


Nice šŸ˜› !! The results comes very impressive as you can see in below image that we have got all the admin rights or privileges.

10-6.png


Credit : Wikipedia& Rapid7

About the AuthorShubham Goyal Certified Ethical Hacker, information security analyst, penetration tester and researcher. Can be Contact on Linkedin.
 

435,899

314,152

314,161

Top