GUI based bypasses¶
These case studies are not usually applicable to real-world scenarios, as they rely on having access to a graphical
session, from where the standard UAC can be elevated. These just serve understanding.
msconfig¶
To obtain access to a High IL command prompt without passing through UAC:
On the target machine open msconfig from the start menu or the “Run” dialogue.
Analyse the msconfig process with Process Hacker - Even when no
UACprompt was presented, msconfig runs as a high IL processNavigate to the Tools tab of msconfig to spawn a shell inheriting the msconfig token: Launch a Command Prompt.
Obtain flag
C:\> C:\flags\GetFlag-msconfig.exe
azman.msc¶
azman.msc will also auto elevate without requiring user interaction, but it has no built-in way to spawn a shell:
On the target machine open azman.msc from the start menu or the “Run” dialogue.
Analyse the process with Process Hacker - a process with high IL was spawned and all
.mscfiles are run frommmc.exe(Microsoft Management Console).Navigate to the Help tab of Azman, an on the help screen, right-click any part of the help article and select
View Source.A notepad process is spawned that can be leveraged get a shell: Go to
File -> Openand make sure to selectAll Filesin the combo box in the lower right corner. Go toC:\Windows\System32and search forcmd.exeand right-click to select Open.Check the process tree in Process Hacker to see how the high integrity token is passed from mmc to cmd.exe
Obtain flag
C:\> C:\flags\GetFlag-azman.exe