Windows Escalate UAC Protection Bypass
This module will bypass Windows UAC by utilizing the trusted publisher certificate through process injection. It will spawn a second shell that has the UAC flag turned off.
- David Kennedy "ReL1K" <kennedyd013 [at] gmail.com>
- mubix <mubix [at] hak5.org>
- Windows x86
- Windows x64
To display the available options, load the module within the Metasploit console and run the commands 'show options' or 'show advanced':
msf > use exploit/windows/local/bypassuac msf exploit(bypassuac) > show targets ...targets... msf exploit(bypassuac) > set TARGET <target-id> msf exploit(bypassuac) > show options ...show and set options... msf exploit(bypassuac) > exploit