Interesting question, is this a UAC bypass? My first thought is no, because UIPI means you can't automate the interaction. Therefore, the only way to exploit it is if you could have just clicked OK in the UAC consent anyway.... right? (yes, I know UAC is not a supported boundary)https://twitter.com/harr0ey/status/1211075032400760832 …
Agreed, although I see that cobalt strike has a UAC bypass which asks the victims to click on yes or no, so, If UAC bypass operation should happen without interaction, why does the method of Cobalt strike UAC bypass asks the victim to click yes or no to get the administrator?
-
-
I guess the method in cobalt strike is used to "trick" to user to click yes. UAC is not meant to prevent stupid users from clicking yes.. The method in cobalt strike is not really a UAC bypass either..
-
If the method in the cobalt strike isn't a UAC bypass, why was Cobalt strike UAC bypass written with name such as UAC bypass?
- Još 4 druga odgovora
Novi razgovor -
-
-
If this is true, then it’s a worthless “bypass” and should come with a very big warning. Other UAC bypasses don’t require user interaction.
@armitagehacker, is this called a bypass in Colbalt Strike? -
Metasploit has windows/local/ask to elevate by prompting the user. Useful, maybe, with social engineering OR for assume breach. Anything that helps demonstrate or meet an objective to move things further along is fair game to me. CS does not have an organic version of this
Kraj razgovora
Novi razgovor -
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.