UAC Bypass Akagai64.exe

Get a meterpreter session on the target and follow the below techinique:-

getprivs
    Enabled Process Privileges
    ==========================
    Name
    ----
    SeChangeNotifyPrivilege
    SeIncreaseWorkingSetPrivilege
    SeShutdownPrivilege
    SeTimeZonePrivilege
    SeUndockPrivilege
  • Verify if admin user is part of the local administrators group

shell
net user
net localgroup administrators

    Alias name   administrators
    Comment   Administrators have complete and unrestricted access to the computer/domain
    Members
    -------------------------------------------------------------------------------
    admin
    Administrator
# "admin" user is a local administrator
  • In order to run programs or tasks with elevated privileges, UAC bypass is necessary

#UAC Bypass & Privesc

  • Generate a meterpreter payload with msfvenom

  • Set up a new msfconsole session and set up a listener with multi/handler, to receive the connection one the payload is executed on the target

    • set the payload used with msfvenom - the windows/meterpreter/reverse_tcp one

    • set the LHOST IP and LPORT of the attack machine, based on the msfvenom generated payload

  • The reverse_tcp handler is listening and ready to receive the connection from the malicious payload

  • Head back in the meterpreter session already opened

  • UAC would prevent running backdoor.exe

  • Run Akagi64.exe executable with UACMe methor 23

  • Elevated meterpreter session should be received on the listener

Last updated