UAC Bypass
About
More about UAC in theory you can read here [LINK]
Here you would be looking more into UAC Bypasses, because every account. even elevated one have two types of tokens, low and high privilege. And sometimes after we got some high-privilege user we need to bypass UAC to actually use high-privilege token. Here I would write about UAC techniques I used during machines or engagements.
Very useful is UACME repository [LINK]
Also this repo is useful [LINK]
UAC Bypass with DLL Hijacking
Review Path Variable
Generate Malicious DLL
Download DLL
Execute Malicious DLL on Target
Ensure No Existing rundll32 Instances
Execute SystemPropertiesAdvanced.exe for UAC Bypass
Verify Elevated Privileges
Last updated