UAC Bypass: UACMe
Last updated
Last updated
In this lab environment, you will be provided with GUI access to a Kali machine. The target machine running a vulnerable server will be accessible at demo.ine.local.
Your task is to fingerprint the application using the tools available on the Kali machine and exploit the application using the appropriate Metasploit module. And then, bypass UAC using the UACME tool.
Objective: Gain the highest privilege on the compromised machine and get admin user NTLM hash.
Note: The UACMe tool is located in "/root/Desktop/tools/UACME/" directory.
The best tools for this lab are:
Nmap
Metasploit Framework
UACME