Interesting question, is this a UAC bypass? My first thought is no, because UIPI means you can't automate the interaction. Therefore, the only way to exploit it is if you could have just clicked OK in the UAC consent anyway.... right? (yes, I know UAC is not a supported boundary)https://twitter.com/harr0ey/status/1211075032400760832 …
-
-
Oops. You're right. Didn't realize UIPI also applies for SendInput too.
Thanks. Twitter will use this to make your timeline better. UndoUndo
-
-
-
I've just read about UIPI, do you think that this is a UIPI bypass or what?
-
Unlikely since you would have to already be in a process that is high-integrity to send the inputs. If you’re, say, a cobalt-strike beacon in a lower integrity process, you wouldn’t be able to click around procmon because it’s already high-integrity.
- 3 more replies
New conversation -
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.