# UACMe
* Defeating Windows User Account Control by abusing built-in Windows AutoElevate backdoor.
# System Requirements
* x86-32/x64 Windows 7/8/8.1/10TH1/10TH2/10RS1/10RS2 (client, some methods however works on server version too).
* Admin account with UAC set on default settings required.
# Usage
Run executable from command line: akagi32 [Key] [Param] or akagi64 [Key] [Param]. See "Run examples" below for more info.
First param is number of method to use, second is optional command (executable file name including full path) to run. Second param can be empty - in this case program will execute elevated cmd.exe from system32 folder.
Keys (watch debug output with dbgview or similar for more info):
1. Author: Leo Davidson
* Type: Dll Hijack
* Method: IFileOperation
* Target(s): \system32\sysprep\sysprep.exe
* Component(s): cryptbase.dll
* Works from: Windows 7 (7600)
* Fixed in: Windows 8.1 (9600)
* How: sysprep.exe hardened LoadFrom manifest elements
2. Author: Leo Davidson derivative
* Type: Dll Hijack
* Method: IFileOperation
* Target(s): \system32\sysprep\sysprep.exe
* Component(s): ShCore.dll
* Works from: Windows 8.1 (9600)
* Fixed in: Windows 10 TP (> 9600)
* How: Side effect of ShCore.dll moving to \KnownDlls
3. Author: Leo Davidson derivative by WinNT/Pitou
* Type: Dll Hijack
* Method: IFileOperation
* Target(s): \system32\oobe\setupsqm.exe
* Component(s): WdsCore.dll
* Works from: Windows 7 (7600)
* Fixed in: Windows 10 TH2 (10558)
* How: side effect of OOBE redesign
4. Author: Jon Ericson, WinNT/Gootkit, mzH
* Type: AppCompat
* Method: RedirectEXE Shim
* Target(s): \system32\cliconfg.exe
* Component(s): -
* Works from: Windows 7 (7600)
* Fixed in: Windows 10 TP (> 9600)
* How: Sbdinst.exe autoelevation removed, KB3045645/KB3048097 for rest Windows versions
5. Author: WinNT/Simda
* Type: Elevated COM interface
* Method: ISecurityEditor
* Target(s): HKLM registry keys
* Component(s): -
* Works from: Windows 7 (7600)
* Fixed in: Windows 10 TH1 (10147)
* How: ISecurityEditor interface method changed
6. Author: Win32/Carberp
* Type: Dll Hijack
* Method: WUSA
* Target(s): \ehome\mcx2prov.exe, \system32\migwiz\migwiz.exe
* Component(s): WdsCore.dll, CryptBase.dll, CryptSP.dll
* Works from: Windows 7 (7600)
* Fixed in: Windows 10 TH1 (10147)
* How: WUSA /extract option removed
7. Author: Win32/Carberp derivative
* Type: Dll Hijack
* Method: WUSA
* Target(s): \system32\cliconfg.exe
* Component(s): ntwdblib.dll
* Works from: Windows 7 (7600)
* Fixed in: Windows 10 TH1 (10147)
* How: WUSA /extract option removed
8. Author: Leo Davidson derivative by Win32/Tilon
* Type: Dll Hijack
* Method: IFileOperation
* Target(s): \system32\sysprep\sysprep.exe
* Component(s): Actionqueue.dll
* Works from: Windows 7 (7600)
* Fixed in: Windows 8.1 (9600)
* How: sysprep.exe hardened LoadFrom manifest
9. Author: Leo Davidson, WinNT/Simda, Win32/Carberp derivative
* Type: Dll Hijack
* Method: IFileOperation, ISecurityEditor, WUSA
* Target(s): IFEO registry keys, \system32\cliconfg.exe
* Component(s): Attacker defined Application Verifier Dll
* Works from: Windows 7 (7600)
* Fixed in: Windows 10 TH1 (10147)
* How: WUSA /extract option removed, ISecurityEditor interface method changed
10. Author: WinNT/Pitou, Win32/Carberp derivative
* Type: Dll Hijack
* Method: IFileOperation, WUSA
* Target(s): \system32\\{New}or{Existing}\\{autoelevated}.exe, e.g. winsat.exe
* Component(s): Attacker defined dll, e.g. PowProf.dll, DevObj.dll
* Works from: Windows 7 (7600)
* Fixed in: Windows 10 TH2 (10548)
* How: AppInfo elevated application path control hardening
11. Author: Jon Ericson, WinNT/Gootkit, mzH
* Type: AppCompat
* Method: Shim Memory Patch
* Target(s): \system32\iscsicli.exe
* Component(s): Attacker prepared shellcode
* Works from: Windows 7 (7600)
* Fixed in: Windows 8.1 (9600)
* How: Sbdinst.exe autoelevation removed, KB3045645/KB3048097 for rest Windows versions
12. Author: Leo Davidson derivative
* Type: Dll Hijack
* Method: IFileOperation
* Target(s): \system32\sysprep\sysprep.exe
* Component(s): dbgcore.dll
* Works from: Windows 10 TH1 (10240)
* Fixed in: Windows 10 TH2 (10565)
* How: sysprep.exe manifest updated
13. Author: Leo Davidson derivative
* Type: Dll Hijack
* Method: IFileOperation
* Target(s): \system32\mmc.exe EventVwr.msc
* Component(s): elsext.dll
* Works from: Windows 7 (7600)
* Fixed in: Windows 10 RS1 (14316)
* How: Missing dependency removed
14. Author: Leo Davidson, WinNT/Sirefef derivative
* Type: Dll Hijack
* Method: IFileOperation
* Target(s): \system\credwiz.exe, \system32\wbem\oobe.exe
* Component(s): netutils.dll
* Works from: Windows 7 (7600)
* Fixed in: Windows 10 TH2 (10548)
* How: AppInfo elevated application path control hardening
15. Author: Leo Davidson, Win32/Addrop, Metasploit derivative
* Type: Dll Hijack
* Method: IFileOperation
* Target(s): \system32\cliconfg.exe
* Component(s): ntwdblib.dll
* Works from: Windows 7 (7600)
* Fixed in: Windows 10 RS1 (14316)
* How: Cliconfg.exe autoelevation removed
16. Author: Leo Davidson derivative
* Type: Dll Hijack
* Method: IFileOperation
* Target(s): \system32\GWX\GWXUXWorker.exe, \system32\inetsrv\inetmgr.exe
* Component(s): SLC.dll
* Works from: Windows 7 (7600)
* Fixed in: Windows 10 RS1 (14316)
* How: AppInfo elevated application path control and inetmgr executable hardening
17. Author: Leo Davidson derivative
* Type: Dll Hijack (Import forwarding)
* Method: IFileOperation
* Target(s): \system32\sysprep\sysprep.exe
* Component(s): unbcl.dll
* Works from: Windows 8.1 (9600)
* Fixed in: Windows 10 RS1 (14371)
* How: sysprep.exe manifest updated
18. Author: Leo Davidson derivative
* Type: Dll Hijack (Manifest)
* Method: IFileOperation
* Target(s): \system32\taskhost.exe, \system32\tzsync.exe (any ms exe without manifest)
* Component(s): Attacker defined dll
* Works from: Windows 7 (7600)
* Fixed in: Windows 10 RS1 (14371)
* How: Manifest parsing logic reviewed
19. Author: Leo Davidson derivative
* Type: Dll Hijack
* Method: IFileOperation
* Target(s): \system32\inetsrv\inetmgr.exe
* Component(s): MsCoree.dll
* Works from: Windows 7 (7600)
* Fixed in: Windows 10 RS1 (14376)
* How: inetmgr.exe executable manifest hardening, MitigationPolicy->ProcessImageLoadPolicy->PreferSystem32Images
20. Author: Leo Davidson derivative
* Type: Dll Hijack
* Method: IFileOperation
* Target(s): \system32\mmc.exe, Rsop.msc
* Component(s): WbemComn.dll
* Works from: Windows 7 (7600)
* Fixed in: unfixed :see_no_evil:
* How: -
21. Author: Leo Davidson derivative
* Type: Dll Hijack
* Method: IFileOperation, SxS DotLocal
* Target(s): \system32\sysprep\sysprep.exe
* Component(s): comctl32.dll
* Works from: Windows 7 (7600)
* Fixed in: unfixed :see_no_evil:
* How: -
22. Author: Leo Davidson derivative
* Type: Dll Hijack
* Method: IFileOperation, SxS DotLocal
* Target(s): \system32\consent.exe
* Component(s): comctl32.dll
* Works from: Windows 7 (7600)
* Fixed in: unfixed :see_no_evil:
* How: -
23. Author: Leo Davidson derivative
* Type: Dll Hijack
* Method: IFileOperation
* Target(s): \system32\pkgmgr.exe
* Component(s): DismCore.dll
* Works from: Windows 7 (7600)
* Fixed in: unfixed :see_no_evil:
* How: -
24. Author: BreakingMalware
* Type: Shell API
没有合适的资源?快使用搜索试试~ 我知道了~
温馨提示
Cobalt Strike是一款由Help Systems公司开发的高级渗透测试框架,它集成了多种渗透测试工具和功能,被广泛用于网络安全评估和红队演练中。支持模拟攻击、内网渗透、网络侦察等,以帮助安全专业人员评估组织的网络防御能力。需要注意的是,Cobalt Strike是一个强大的工具,应该仅在合法和授权的渗透测试中使用。
资源推荐
资源详情
资源评论
收起资源包目录
CobaltSrike 4.9.1.zip (2750个子文件)
+郡_鸡_cna 12KB
+郡_鸡_cna 12KB
+郡苔__cna 8KB
+郡苔__cna 8KB
-+-唉__cna 1KB
-+-唉__cna 1KB
-+-唉ⅵ_cna 7KB
-+-唉ⅵ_cna 7KB
003c809d9cc39d3e0f64a35b30777025f183b3 19KB
003c809d9cc39d3e0f64a35b30777025f183b3 19KB
00a931d43f46884f4ac8572fb03ae10dde807e 3KB
00a931d43f46884f4ac8572fb03ae10dde807e 3KB
020ced2065436d5ecce913697ba8b29005c481 524B
020ced2065436d5ecce913697ba8b29005c481 524B
04758c7088016228f5e661dd159d1b17022e67 201B
04758c7088016228f5e661dd159d1b17022e67 201B
062ab445ae1d2a1aadf8dd97f651b9ec8723d4 57KB
062ab445ae1d2a1aadf8dd97f651b9ec8723d4 57KB
0797349d36a3d4c398b6e854842e11909306b9 356B
0797349d36a3d4c398b6e854842e11909306b9 356B
090db5e5395136f8500e7a63b1e37c7dcef8bc 406B
090db5e5395136f8500e7a63b1e37c7dcef8bc 406B
0950cdb5eb71e527ad9b2585a61eb480173ee0 2KB
0950cdb5eb71e527ad9b2585a61eb480173ee0 2KB
09634a6319e533916a03ffbcae0ab3edc94b1a 88B
09634a6319e533916a03ffbcae0ab3edc94b1a 88B
0b81235ef631991852a4f046d6d7b6b538f4d3 409B
0b81235ef631991852a4f046d6d7b6b538f4d3 409B
0b814ecc06c5207644cfe78c941c554d69f930 163B
0b814ecc06c5207644cfe78c941c554d69f930 163B
0e6aa326dcf4e250f0eb2bc64102cc73f814f7 3KB
0e6aa326dcf4e250f0eb2bc64102cc73f814f7 3KB
0e6c495f73dfb0904003f311106aebb4d9f3ba 306B
0e6c495f73dfb0904003f311106aebb4d9f3ba 306B
1019c0f74c9631057ba2cc1890a4f9cc23dc8f 561B
1019c0f74c9631057ba2cc1890a4f9cc23dc8f 561B
103ba0fbe576961995039096bffcd42bfdb8ae 2KB
103ba0fbe576961995039096bffcd42bfdb8ae 2KB
109378207e5ae8497d7e700cd01e8e473b58eb 383B
109378207e5ae8497d7e700cd01e8e473b58eb 383B
12182f2c36a21edfb54512c5df8873b5f63f10 155B
12182f2c36a21edfb54512c5df8873b5f63f10 155B
134ace9950fc6f1f2aa90d44ecaaadbc4414eb 734B
134ace9950fc6f1f2aa90d44ecaaadbc4414eb 734B
135b33e5cad0b66f3d2ffc1ea31293d4131ee6 154B
135b33e5cad0b66f3d2ffc1ea31293d4131ee6 154B
15eb52684f687cb99bcc8917df50253872215e 145KB
15eb52684f687cb99bcc8917df50253872215e 145KB
178162f293a8d35baf44962b52affeb705fab7 407B
178162f293a8d35baf44962b52affeb705fab7 407B
1d04f46f8c3b8ec37d3be80bb0cddd8e7fb274 89B
1d04f46f8c3b8ec37d3be80bb0cddd8e7fb274 89B
1e5b3055530abded71b132af34e803813a07ad 723B
1e5b3055530abded71b132af34e803813a07ad 723B
226bcb8a7462a825e12ce75503da87d2b8d55c 327B
226bcb8a7462a825e12ce75503da87d2b8d55c 327B
236afc49a7e421a30414056cb5040fb80abdc2 328B
236afc49a7e421a30414056cb5040fb80abdc2 328B
23df4f1772c9b10039d53b7e7c754a710368d2 2KB
23df4f1772c9b10039d53b7e7c754a710368d2 2KB
23fd6bc785d0dbe1f5eb34b93907de2afc621e 5.69MB
23fd6bc785d0dbe1f5eb34b93907de2afc621e 5.69MB
29cfa99203efb28985a414894ced33e97c6836 326B
29cfa99203efb28985a414894ced33e97c6836 326B
2b2debeaa870e6bdf416936ddbd2158f62b034 1KB
2b2debeaa870e6bdf416936ddbd2158f62b034 1KB
2d9cecab69e815c607fa7bbcce1425961bc7bc 63B
2d9cecab69e815c607fa7bbcce1425961bc7bc 63B
31e0700071fc05bbe25f32ad2ce7841a66fb79 2KB
31e0700071fc05bbe25f32ad2ce7841a66fb79 2KB
32e3af0598bb3cc054602e120bad971cc38f3c 358B
32e3af0598bb3cc054602e120bad971cc38f3c 358B
34c4da5b37e443d888397dca3b39eaf52fcd74 521B
34c4da5b37e443d888397dca3b39eaf52fcd74 521B
Q.DE025521D9553BF79B0D2B3B82D99CBE.360ResTmp 92KB
Q.505A97649701ABED837CD22F5A487A76.360ResTmp 92KB
Q.DAB33E62AB376FAD317E7EC66F6DBD12.360ResTmp 92KB
Q.44DA3057865A3AA8F88BB0A955086C62.360ResTmp 92KB
Q.9C1CE88C874A9643F3BF971AA18AFD9D.360ResTmp 92KB
Q.E4A6A14B5005CC6A4B3E8A86C6B71260.360ResTmp 92KB
Q.D2B4D897F3132CDCD0C7C2CA767D25DD.360ResTmp 92KB
Q.75B97D2A306D6124C17E2DB3F455D314.360ResTmp 92KB
Q.7C97FB4E9814081CF1F90CEF46B49F41.360ResTmp 92KB
Q.DE025521D9553BF79B0D2B3B82D99CBE.360ResTmp 92KB
Q.505A97649701ABED837CD22F5A487A76.360ResTmp 92KB
Q.DAB33E62AB376FAD317E7EC66F6DBD12.360ResTmp 92KB
Q.44DA3057865A3AA8F88BB0A955086C62.360ResTmp 92KB
Q.9C1CE88C874A9643F3BF971AA18AFD9D.360ResTmp 92KB
Q.E4A6A14B5005CC6A4B3E8A86C6B71260.360ResTmp 92KB
Q.D2B4D897F3132CDCD0C7C2CA767D25DD.360ResTmp 92KB
Q.75B97D2A306D6124C17E2DB3F455D314.360ResTmp 92KB
Q.7C97FB4E9814081CF1F90CEF46B49F41.360ResTmp 92KB
Q.19C57C82096D29E95C5E3D132AB8D96A.360ResTmp 84KB
Q.F9E48788ACFB6D3CECC75B153DFD997A.360ResTmp 84KB
Q.E12E933122564EFD4F85F5857C796C84.360ResTmp 84KB
Q.A6F4BF93C2ED267C10E0ECF2DBD7CCFA.360ResTmp 84KB
Q.E9CEFFFC4229F515CC4AAA17ECEACD28.360ResTmp 84KB
Q.2F8C23E259479B26D940AB1F3F27CB59.360ResTmp 84KB
Q.00F755401FFA205E3158E497A1481883.360ResTmp 84KB
Q.ACD6F7B93159D1258BAC6477DB2C96D9.360ResTmp 84KB
共 2750 条
- 1
- 2
- 3
- 4
- 5
- 6
- 28
资源评论
Scr1Pt0908
- 粉丝: 293
- 资源: 2
上传资源 快速赚钱
- 我的内容管理 展开
- 我的资源 快来上传第一个资源
- 我的收益 登录查看自己的收益
- 我的积分 登录查看自己的积分
- 我的C币 登录后查看C币余额
- 我的收藏
- 我的下载
- 下载帮助
最新资源
- RC振荡电路——文氏桥振荡电路(OP07仿真)_文氏桥振荡器-CSDN博客.mhtml
- vs2022安装包,推荐安装社区版
- 固件开发项目实例1000例实例(26)--智能家居安全系统的固件设计.docx
- 固件开发项目实例1000例实例(24)--智能健康手环的固件设计.docx
- 基于Simulink的小波变换滤波器.docx
- 吉林大学2024就业质量年度报告
- 常用工具:谷歌浏览器安装包
- FPC0.5立贴, footprint expert封装
- DigiShow 教程5 艺术灯光应用
- DigiShow 教程6 数码音乐应用
- pikachu-master.zip
- DigiShow 教程7 互动装置应用
- DigiShow 教程8 表达式和脚本
- Word自动填表组件-发票打印,报名表自动生成
- FPC0.5l立贴, footprint expert封装
- 复旦大学计算机网络课后习题及答案.zip
资源上传下载、课程学习等过程中有任何疑问或建议,欢迎提出宝贵意见哦~我们会及时处理!
点击此处反馈
安全验证
文档复制为VIP权益,开通VIP直接复制
信息提交成功