-
Notifications
You must be signed in to change notification settings - Fork 2.8k
Windows Local Privilege Escalation Module - SLUI BypassUAC #1243
base: dev
Are you sure you want to change the base?
Conversation
Change workspace Slack
Update README.md
This will add support for fiddle which is recommended instead of 'DL'. Versions 2.3 and above will use Fiddle, while versions before that will use DL. This will log stderr to logfile as well instead of outputing to terminal (better opsec)
Update Slack link
Hi, Unfortunately, your module fails on my lab. On Empire side:
Am I missing something ? 🌻 |
Hmm, honestly I'm not sure. So keep testing out new things. |
Weeeelllllll, I think I misunderstood. From the beginning I tried to use your module like a normal empire bypass UAC module : launch it and wait for the new agent to pop. But in fact your module take a I think you should rewrite your module in order to keep bypass UAC module architecture consistent. A privesc module (like a UAC bypass one) have to launch a second agent (elevated one). It must be easy to implement (see others UAC bypass modules) 🌻 |
It's the main hurdle I came across..adding a launcher to automatically execute. However, I urge you or anyone else for that(preferably more skilled than me) to look at the code and make improvements. |
I'll give a try to implement the correct method, I'll submit a new PR based on this one. 🌻 |
Awesome dude, I'd appreciate the help. |
This is a simple privilege escalation module that was already written in PowerShell by gushmazuko:https://github.com/gushmazuko/WinBypass
It works by simply taking a one liner (can be any) to execute our powershell empire payload and we get a high privilege Empire shell.
Hopefully this helps someone out there like it did from my engagement today.
If you have any questions feel free to ping me on twitter/slack and also feel free to improve in any way shape or form.