UAC Bypass Akagai64.exe
Get a meterpreter session on the target and follow the below techinique:-
Verify if
admin
user is part of the local administrators group
In order to run programs or tasks with elevated privileges, UAC bypass is necessary
#UAC Bypass & Privesc
Generate a
meterpreter
payload withmsfvenom
Set up a new
msfconsole
session and set up a listener withmulti/handler
, to receive the connection one the payload is executed on the targetset the payload used with
msfvenom
- thewindows/meterpreter/reverse_tcp
oneset the LHOST IP and LPORT of the attack machine, based on the
msfvenom
generated payload
The
reverse_tcp handler
is listening and ready to receive the connection from the malicious payloadHead back in the
meterpreter
session already opened
UAC would prevent running
backdoor.exe
Run
Akagi64.exe
executable with UACMe methor 23
Elevated
meterpreter
session should be received on the listener
Last updated