Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

What won't be included #57

Closed
hfiref0x opened this issue Apr 26, 2019 · 0 comments
Closed

What won't be included #57

hfiref0x opened this issue Apr 26, 2019 · 0 comments

Comments

@hfiref0x
Copy link
Owner

hfiref0x commented Apr 26, 2019

  1. Everything based on user manipulations with program UI, shell dialogs, e.g. OpenDialog, SaveDialog from elevated application. This is not UAC bypass as it require massive user interactions with UI and target applications have High Integrity preventing GUI hacking. Consider everything like this as just a trash for social media hype. Example Module request - msdt.exe UAC bypass #28. The only exception to this is Forshaw method 55 as it provides an original way to circumvent UIPI and do the automation with minimum UI interactions.

  2. "UAC bypasses" involving manual writing to HKEY_LOCAL_MACHINE. You either force this your own or this is exploit that needs to be patched.

  3. UAC bypasses based on switching one DLL name to another while core method stay the same.
    E.g. https://github.com/Cn33liz/TpmInitUACAnniversaryBypass. The exception can only be made if the previous target is no longer work or this is used in ITW malware (e.g. various sysprep dll combinations, Pitou method).

  4. Copy-paste "UAC bypasses" - that having no purpose except show off in twitter/any other social media, is when author takes something already known (not even his origin) and reinvents the wheel for public post, e.g. UAC bypass with Direct call to RAiLaunchAdminProcess and mmc #55

  5. Everything patched by MS Bulletin as part of exploit patch with exception if it was previously used in malware. E.g. Sandworm method.

  6. Methods that only work on Windows Server. This obviously do not make any sense.

@hfiref0x hfiref0x pinned this issue Apr 26, 2019
Repository owner locked as resolved and limited conversation to collaborators Apr 26, 2019
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Projects
None yet
Development

No branches or pull requests

1 participant