Felix aka [xi-tauw]

77 posts

Felix aka [xi-tauw]

Felix aka [xi-tauw]

@PsiDragon

Windows Privilege Escalator

in da web Katılım Aralık 2010
28 Takip Edilen985 Takipçiler
Black Hills Information Security
Black Hills Information Security@BHinfoSecurity·
R8: 1 2 R9: 2 1 2 4 1 3 2 R10: 3 3 3 1 1 1 R11: 1 3 2 1 1 1 1 2 R12: 1 3 5 1 3 R13: 3 1 2 1 5 1 2 R14: 1 1 1 1 1 1 1 2 2 1 R15: 2 7 1 4 1 1 R16: 1 1 1 3 1 1 1 R17: 2 1 1 1 8 R18: 1 1 1 1 1 2 1 R19: 7 5 2 1 2 2 R20: 1 1 1 1 1 1 5 R21: 1 3 1 1 6 1 R22: 1 3 1 1 2 1 1 4
CY
7
6
13
0
Felix aka [xi-tauw]
Felix aka [xi-tauw]@PsiDragon·
UAC bypass: Copy payload dll (IFileOperation) as C:\Windows\System32\wbem\wbemcomn.dll then run diskmgmt.msc Essence: diskmgmt invokes start of vds service (NT AUTHORITY\SYSTEM), that loads the dll. Also the dll could be used for persistence (via WmiPrvSE.exe), but I'm not sure.
English
2
0
3
0
sailay(valen)
sailay(valen)@404death·
@PsiDragon @hFireF0X hmm, but, how can we copy the dll file to C:\Windows\System32\wbem\ without having administrator privileged ?
English
1
0
0
0
0r3ak
0r3ak@0xTback·
@PsiDragon C:\Windows\System32\wbem\ have to need the Administrators ?
English
1
0
0
0
Tavis Ormandy
Tavis Ormandy@taviso·
Interesting question, is this a UAC bypass? My first thought is no, because UIPI means you can't automate the interaction. Therefore, the only way to exploit it is if you could have just clicked OK in the UAC consent anyway.... right? (yes, I know UAC is not a supported boundary)
Jihad abdrazak@harr0ey

[New-Post] UAC bypass using Perfmon.exe @mattharr0ey/uac-bypass-via-font-in-perfmon-exe-options-2b4779955d9e" target="_blank" rel="nofollow noopener">medium.com/@mattharr0ey/u…

English
6
4
30
0
David Valles
David Valles@davidvalles007·
@PsiDragon Nicely written post. For CVE-2019-19247, how were you sending commands to the named pipe? Is there a native command or script/tool to do interaction with a named pipe?
English
1
0
0
0
Grzegorz Tworek
Grzegorz Tworek@0gtweet·
Persistency tip: if you have admin rights for a moment, just add “WD” or “DC” to SDDL of any of Windows Services. It will allow you to elevate your privileges back any moment you need. Good luck finding this, Blue Team...
English
7
72
261
0
Matt Nelson
Matt Nelson@enigma0x3·
Today is going well.
Matt Nelson tweet media
English
11
6
59
0
y3gou
y3gou@y3gou666·
@PsiDragon so how to download old version steam for recurrencing the vulnerability?☹️
English
1
0
0
0
Felix aka [xi-tauw]
Felix aka [xi-tauw]@PsiDragon·
Unbanned on h1. So try do new report there.
English
3
0
14
0