UAC
Check current user with whoami /user
Check admin group membership: net localgroup administrators
Check privileges: whoami /priv
Check if UAC is enabled:
0x1 is enabled.
Check UAC level:
If its is 0x5 then Always notify is enabled
Check windows version with powershell:
Then cross-reference with this page
Then check UACME.
Here trying technique 54:
This technique targets the 32-bit version of the auto-elevating binary SystemPropertiesAdvanced.exe.
It tries to load a non-existent dll srrstr.dll
It follows the following search order:
The directory from which the application loaded.
The system directory C:\Windows\System32 for 64-bit systems.
The 16-bit system directory C:\Windows\System (not supported on 64-bit systems)
The Windows directory.
Any directories that are listed in the PATH environment variable.
Check path:
cmd /c echo %PATH%
Then we can place a malicious srrstr.dll DLL to WindowsApps folder.
Malicious srrstr.dll
Now running the dll we get a normal reverse shell back:
To get privileged shell back run: C:\Windows\SysWOW64\SystemPropertiesAdvanced.exe
We get a reverse shell back.
Last updated