Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Not working for me. Code looks good #1

Open
adriangomez123 opened this issue Jun 8, 2022 · 5 comments
Open

Not working for me. Code looks good #1

adriangomez123 opened this issue Jun 8, 2022 · 5 comments

Comments

@adriangomez123
Copy link

Version of Windows I've tried and didn't made the escalation.

Microsoft Windows [Version 10.0.22000.675] - Windows 11
Microsoft Windows [Version 10.0.19042.1348] - Windows 10

shell is working if executed by itself, but not working when trying to make the UAC bypass with eventvwr-bypassuac-64.exe.

Let me know if I am doing something wrong or if it's dependant on anything else. Btw, I have a couple errors at event viewer when it executed, related to shell.exe :

ERROR 1 - Faulting module path: C:\WINDOWS\SYSTEM32\ntdll.dll -
ERROR 2 -
Fault bucket -1046961166, type 5
Event Name: FaultTolerantHeap
Response: Not available
Cab Id: 0

Problem signature:
P1: shell.exe
P2: 0.0.0.0
P3: 4BC63C7D
P4: ffffbaad

@k4sth4
Copy link
Owner

k4sth4 commented Jun 9, 2022

Version of Windows I've tried and didn't made the escalation.

Microsoft Windows [Version 10.0.22000.675] - Windows 11 Microsoft Windows [Version 10.0.19042.1348] - Windows 10

shell is working if executed by itself, but not working when trying to make the UAC bypass with eventvwr-bypassuac-64.exe.

Let me know if I am doing something wrong or if it's dependant on anything else. Btw, I have a couple errors at event viewer when it executed, related to shell.exe :

ERROR 1 - Faulting module path: C:\WINDOWS\SYSTEM32\ntdll.dll - ERROR 2 - Fault bucket -1046961166, type 5 Event Name: FaultTolerantHeap Response: Not available Cab Id: 0

Problem signature: P1: shell.exe P2: 0.0.0.0 P3: 4BC63C7D P4: ffffbaad

Did you compiled the exploit in the same dir where you've shell.exe because it uses that shell.exe and if you've changed the name of the exploit from shell.exe to whatever. You need to provide it on that c script. If you've done everything as it said.
Then try to change the directory run the exploit from C:\programdata or some other writable directory. If still getting errors then may be firewall is running.
Also ensure that eventvwr.exe exists and is set to autoelevate to High integrity. Follow the steps https://k4sth4.github.io/UAC-bypass/

@k4sth4 k4sth4 closed this as completed Jun 10, 2022
@adriangomez123
Copy link
Author

Still not working, I am having shell in the same directory at compile time. It open eventvwr without injecting the shell. Firewall is disabled. I tried changing curpath values to "C:\ProgramData\shell.exe" but didn't worked running it from there either. Any other ideas?

@k4sth4 k4sth4 reopened this Jun 18, 2022
@k4sth4
Copy link
Owner

k4sth4 commented Jun 18, 2022

Still not working, I am having shell in the same directory at compile time. It open eventvwr without injecting the shell. Firewall is disabled. I tried changing curpath values to "C:\ProgramData\shell.exe" but didn't worked running it from there either. Any other ideas?

If the exploit has successfully compiled, it means the shell.exe has embedded in that exploit. The next thing to do is take the exploit to target machine and execute it.
Try to run from C:\Windows\System32\spool\drivers\color dir.
Try to execute exploit with full path.
And make sure autoelevate is set to True.

@kwewrf
Copy link

kwewrf commented Jun 18, 2022

Still not working, I am having shell in the same directory at compile time. It open eventvwr without injecting the shell. Firewall is disabled. I tried changing curpath values to "C:\ProgramData\shell.exe" but didn't worked running it from there either. Any other ideas?

Make sure the compilation is done from kali vm and without any errors. Then everything will run smoothly.

@handbye
Copy link

handbye commented Apr 27, 2023

don't work for me
image
image
image

when i run .\eventvwr-bypassuac-64.exe , it only open event viewer , don't execute shell.exe

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

4 participants