Welcome to elevationstation Discussions! #1
Replies: 1 comment 1 reply
-
I'll start. what's the deal with this issue I'm running in to? In short, if you right click on cmd.exe and run as admin, all the expected functionality of ElevationStation and CreateProcessAsUser API fully cooperates and spawns a shell within your current console. However, if I do a UAC bypass/escalate (something I have working and REALLY want to add to this solution) from a standard user that is a member of the administrators group and get a shell (that is running with high integrity and elevated admin cmd prompt), I get an access denied 0x5 on CreateProcessAsUser. I have all the necessary token privs required. no change there. Both cmd.exe's are running within local administrator privileges...I'll keep researching but if anyone has thoughts please, by all means, chime in. |
Beta Was this translation helpful? Give feedback.
-
👋 Welcome!
Yo! I'm using Discussions as a place to connect with other members of the InfoSec community and discuss this project in greater detail.
So without further ado, start chatting!
Beta Was this translation helpful? Give feedback.
All reactions