Skip to content

Lonely x64 binary to Bypass Win10 UAC utilizing ALPC method with [command line]

Notifications You must be signed in to change notification settings

w4fz5uck5/LonelyALPC-BypassUAC

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

26 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

LonelyALPC-BypassUAC

ATTENTION! This script will not work until you change ALPC-BypassUAC.cpp#L171C2 for your personal Link (it must return a b64 of your C:\Windows\tasks\WinDrivers.msc

Lonely x64 binary to Bypass Win10 UAC utilizing ALPC (mmc) method with [command line] ! Tested on Win10 1809 and 1909

Usage: .\LonelyALPC-BypassUAC.exe "calc.exe && notepad.exe"

These commands will be run as SYSTEM Privileges

NOTES: Thanks to [DimopoulosElias] for the original exploit https://github.com/DimopoulosElias/alpc-mmc-uac-bypass

I didn't implemented any powershell module with base64 encoding or binary unpacking.. the method which i'm utilizing at now is by using get-system.ps1 and executing it module via IEX from: https://github.com/HarmJ0y/Misc-PowerShell/blob/master/Get-System.ps1

Also, i didn't binary unpacking or base64 enconding for the .msc file, which is ran by mmc.exe service. That .msc file after all is necessary to turn this service on to be accessible by our fake webserver and perform code execution.

EXAMPLE (Updated 08/12/2019):

SYSTEM - NOTEPAD.exe: alt text

ADD ADMIN USER alt text

About

Lonely x64 binary to Bypass Win10 UAC utilizing ALPC method with [command line]

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published