π‘οΈUAC Bypass
π― Overview
π UAC Fundamentals
Admin Approval Mode (AAM)
# Standard user token (default context)
whoami /priv
# Limited privileges:
SeShutdownPrivilege Disabled
SeChangeNotifyPrivilege Enabled
SeUndockPrivilege DisabledUAC Configuration Check
# Check if UAC is enabled
REG QUERY HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\System\ /v EnableLUA
# EnableLUA REG_DWORD 0x1 (Enabled)
# Check UAC level
REG QUERY HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\System\ /v ConsentPromptBehaviorAdmin
# 0x5 = Always notify (highest level)
# 0x2 = Prompt for consent for non-Windows binaries
# 0x0 = Elevate without promptingπ§ DLL Hijacking Technique (UACME #54)
Windows Build Assessment
DLL Search Order Exploitation
Target Binary Analysis
π Exploitation Process
1. Generate Malicious DLL
2. Deploy DLL to Target
3. Test Standard Execution
4. UAC Bypass Execution
π― HTB Academy Lab Solution
Lab Environment
Complete Walkthrough
π Alternative UAC Bypasses
UACME Project Techniques
Registry-Based Bypasses
β οΈ Detection & Defense
Detection Indicators
Defensive Measures
π‘ Key Takeaways
Last updated