User Account control (UAC)

The default RID 500 administrator account always operates at the high mandatory level.

In the example below, the user account sarah is in the administrators group, but cmd.exe is currently running in the context of their unprivileged access token.

C:\htb> whoami /user

USER INFORMATION
----------------

User Name         SID
================= ==============================================
winlpe-ws03\sarah S-1-5-21-3159276091-2191180989-3781274054-1002
C:\htb> net localgroup administrators

Alias name     administrators
Comment        Administrators have complete and unrestricted access to the computer/domain

Members

-------------------------------------------------------------------------------
Administrator
mrb3n
sarah
The command completed successfully.

Confirming UAC is Enabled

Checking UAC Level

ConsentPromptBehaviorAdmin is 0x5, which means the highest UAC level of Always notify is enabled

Checking Windows Version

UAC bypasses leverage flaws or unintended functionality in different Windows builds

build version 14393 -> Windows release 1607.

Use technique number 54, which is stated to work from Windows 10 build 14393.

Reviewing Path Variable

When attempting to locate a DLL, Windows will use the following search order.

  1. The directory from which the application loaded.

  2. The system directory C:\Windows\System32 for 64-bit systems.

  3. The 16-bit system directory C:\Windows\System (not supported on 64-bit systems)

  4. The Windows directory.

  5. Any directories that are listed in the PATH environment variable.

Generating Malicious srrstr.dll DLL

Testing Connection

Executing SystemPropertiesAdvanced.exe on Target Host

If you test connection before, Rundl32 End Task then run SystemPropertiesAdvanced.exe

Tools

See Citrix Breakout

Citrix Breakout

Last updated