User Account control (UAC)
The default RID 500 administrator account always operates at the high mandatory level.
In the example below, the user account sarah is in the administrators group, but cmd.exe is currently running in the context of their unprivileged access token.
C:\htb> whoami /user
USER INFORMATION
----------------
User Name SID
================= ==============================================
winlpe-ws03\sarah S-1-5-21-3159276091-2191180989-3781274054-1002C:\htb> net localgroup administrators
Alias name administrators
Comment Administrators have complete and unrestricted access to the computer/domain
Members
-------------------------------------------------------------------------------
Administrator
mrb3n
sarah
The command completed successfully.Confirming UAC is Enabled
Checking UAC Level
ConsentPromptBehaviorAdmin is 0x5, which means the highest UAC level of Always notify is enabled
Checking Windows Version
UAC bypasses leverage flaws or unintended functionality in different Windows builds
build version 14393 -> Windows release 1607.
Use technique number 54, which is stated to work from Windows 10 build 14393.

Reviewing Path Variable
When attempting to locate a DLL, Windows will use the following search order.
The directory from which the application loaded.
The system directory
C:\Windows\System32for 64-bit systems.The 16-bit system directory
C:\Windows\System(not supported on 64-bit systems)The Windows directory.
Any directories that are listed in the PATH environment variable.
Generating Malicious srrstr.dll DLL
Testing Connection
Executing SystemPropertiesAdvanced.exe on Target Host

If you test connection before, Rundl32 End Task then run SystemPropertiesAdvanced.exe
Tools
See Citrix Breakout
Citrix BreakoutLast updated
