User Access Control (UAC) Bypass

Description

Runs a PowerShell cradle to load a Specter into a high integrity process from an medium integrity process without triggering a UAC prompt.

Overview

Spawns a high integrity process from a medium integrity process without having to use the GUI. There are 19 techniques provided out-of-the-box. The table below outlines key information about each technique.

The success of these techniques is dependent upon the OS version being vulnerable and an AV that doesn’t have this behavior signaturized. Windows Defender has done a pretty good job of creating behavioral based signatures quickly after discovery.

Name Description
FodHelper Abuses the FodHelper.exe auto-elevate binary via registry hijack.
Sdclt Abuses Sdclt.exe auto-elevate binary via registry hijack.
Slui Abuses Slui.exe auto-elevate binary via registry hijack.
TokenDuplication Duplicates a high-integrity token from an elevated process.
EventVwr Abuses EventVwr.exe auto-elevate binary via registry hijack.
RunAs Uses the RunAs verb to request elevation.
ComputerDefaults Abuses ComputerDefaults.exe auto-elevate binary via registry hijack.
WsReset Abuses WsReset.exe auto-elevate binary via registry hijack.
SilentCleanup Abuses the SilentCleanup scheduled task which runs with elevated privileges.
SluiChangePk Abuses Slui.exe with the changepk argument via registry hijack.
Cmstp Abuses CMSTP.exe to execute an elevated COM object.
CompMgmtLauncher Abuses CompMgmtLauncher.exe auto-elevate binary via registry hijack.
SdcltIsolatedCommand Abuses Sdclt.exe IsolatedCommand registry key for elevation.
SdcltAppPaths Abuses Sdclt.exe via App Paths registry hijack.
Perfmon Abuses Perfmon.exe auto-elevate binary via registry hijack.
FodHelperProtocol Abuses FodHelper.exe via protocol handler registry hijack.
WsResetProtocol Abuses WsReset.exe via protocol handler registry hijack.
FodHelperCurVer Abuses FodHelper.exe via CurVer registry hijack.
CmstpLuaUtil Abuses CMSTP via the CMLUAUTIL elevated COM object.

By default the FodHelper technique is used. You can specify a different technique with the -Technique parameter.

Use the -Force parameter to override safety checks for techniques that are flagged as potentially unsafe.

Parameters

  • Technique — The UAC bypass technique to use. Valid values: FodHelper, Sdclt, Slui, TokenDuplication, EventVwr, RunAs, ComputerDefaults, WsReset, SilentCleanup, SluiChangePk, Cmstp, CompMgmtLauncher, SdcltIsolatedCommand, SdcltAppPaths, Perfmon, FodHelperProtocol, WsResetProtocol, FodHelperCurVer, CmstpLuaUtil. Default: FodHelper.
  • Force — Override safety checks for techniques that require it.

Dependencies

  • credentials

Pre-Requisites

  • User is a member of the local Administrators group.
  • Process is running at medium integrity.

Operating Systems

  • Windows
Scroll to Top