module

Windows UAC Protection Bypass (Via Slui File Handler Hijack)

Disclosed
Jan 15, 2018
Created
Jun 14, 2018

Description

This module will bypass UAC on Windows 8-10 by hijacking a special key in the Registry under
the Current User hive, and inserting a custom command that will get invoked when any binary
(.exe) application is launched. But slui.exe is an auto-elevated binary that is vulnerable
to file handler hijacking. When we run slui.exe with changed Registry key
(HKCU:\Software\Classes\exefile\shell\open\command), it will run our custom command as Admin
instead of slui.exe.

The module modifies the registry in order for this exploit to work. The modification is
reverted once the exploitation attempt has finished.

The module does not require the architecture of the payload to match the OS. If
specifying EXE::Custom your DLL should call ExitProcess() after starting the
payload in a different process.

Authors

bytecode-77
gushmazuko

Platform

Windows

Module Options

To display the available options, load the module within the Metasploit console and run the commands 'show options' or 'show advanced':


msf > use exploit/windows/local/bypassuac_sluihijack
msf exploit(bypassuac_sluihijack) > show targets
...targets...
msf exploit(bypassuac_sluihijack) > set TARGET < target-id >
msf exploit(bypassuac_sluihijack) > show options
...show and set options...
msf exploit(bypassuac_sluihijack) > exploit

Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.