I have been trying to escalate my privileges on a compromised windows 7 laptop (x86). I tried a couple of different things but I wasn't successful at all:
getsystem -> UAC block my attemp: Access denied
exploit bypassuac -> Exploit failed timeout-expired: Timeout::Error execution expired. After reading about it, it seems that Microsoft Security Essentials identifies the payload as Trojan:Win32/Swrort
exploit bypassuac_injection -> States that I was successfull with the injection but does not start a second meterpreter session. It also states that manual cleanup might be necessary, and I really don't understand why...
exploit ask -> - Exploit failed: Rex::TimeoutError Operation timed out
After researching, I found out that ask always uses a self-generated payload which is easily detected by AV.
What method would you should to bypass windows UAC? I am a bit confused with the bypassuac_injection as it should give me a second session and it didn't...
Thanks in advance!