8bytes
Learn common ways to bypass User Account Control (UAC) in Windows hosts.
Q1: Click and continue learning!
Ans1: No answer needed
Q1: What is the highest integrity level (IL) available on Windows?
Ans1: system
Q2: What is the IL associated with an administrator’s elevated token?
Ans2: high
Q3: What is the full name of the service in charge of dealing with UAC elevation requests?
Ans3: application information service
Q1: What flag is returned by running the msconfig exploit?
Ans1: THM{UAC_HELLO_WORLD}
Q2: What flag is returned by running the azman.msc exploit?
Ans2: THM{GUI_UAC_BYPASSED_AGAIN}
Q1: What flag is returned by running the fodhelper exploit?
Ans1: THM{AUTOELEVATE4THEWIN}
Q1: What flag is returned by running the fodhelper-curver exploit?
Ans1: THM{AV_UAC_BYPASS_4_ALL}
Q1: What flag is returned by running the DiskCleanup exploit?
Ans1: THM{SCHEDULED_TASKS_AND_ENVIRONMENT_VARS}
Q1: Click and continue learning!
Ans1: No answer needed
Q1: Click and continue learning!
Ans1: No answer needed