Abuse Elevation Control Mechanism
Bypass User Account Control
CS:
Covenant:
Create a hidden instance of an auto-elevating process (e.g. Taskmgr.exe or wusa.exe) to duplicate and impersonate its token and then bypass UAC:
Metasploit:
Several bypassuac modules exist under exploit/windows/local/. E.g.:
Elevated Execution with Prompt
Setuid and Setgid
Sudo and Sudo Caching
Last updated