UAC Bypass: UACMe

Lab Environment

In this lab environment, you will be provided with GUI access to a Kali machine. The target machine running a vulnerable server will be accessible at demo.ine.local.

Your task is to fingerprint the application using the tools available on the Kali machine and exploit the application using the appropriate Metasploit module. And then, bypass UAC using the UACME tool.

Objective: Gain the highest privilege on the compromised machine and get admin user NTLM hash.

Note: The UACMe tool is located in "/root/Desktop/tools/UACME/" directory.

Tools

The best tools for this lab are:

  • Nmap

  • Metasploit Framework

  • UACME

Writeup

nmap -sV -sC -O -p- -T4 demo.ine.local

Last updated