This tutorial was written with Windows 7 in mind, but the principle applies to all versions starting from 7.
Processes in Windows run at different levels of integrity, representing the different amounts of "trust" they have to interact with the computer. The levels are as follows:
- System - System level of integrity
- Administrator - High level
- Authenticated User - Medium level
- Everyone - Low level
- Anonymous - Untrusted
If User Account Control is enabled, programs run at medium (Or lower) integrity, even if the user starting them has Administrator rights. This limits damage malware can do to the computer, as it can only interact with user files. When a program needs to run on a higher integrity level, it has to prompt the user to give it admin rights.
UAC has 4 different levels:
- Always notify: User is notified any time anything needs elevated privileges.
- Notify me only when programs try to make changes to my computer: User is prompted when a program needs elevated privileges
- Notify me only when programs try to make changes to my computer (Don't dim the desktop): Doesn't dim the desktop when showing a prompt. Less secure than above level.
- Never notify: User is never notified about changes to the computer.
If a user is an administrator, they can press "Yes" to give the asking process higher integrity, or, if they are not an admin, they have to type in the administrator password.
Our goal here is to get a process to start with high integrity without interacting with the user. This technique will work only if they are an administrator, and UAC is not at "Always notify" level.
DLL hijacking is a technique used to force programs to load malicious DLLs. A program normally should search for DLLs like this:
0.1 If DLL is already loaded, use it.
0.2 If DLL is on the list of known DLLs, stored in registry, load it from the path on the list.
- Hardcoded path
- System directory
- 16 bit system directory
- Windows directory
- Current directory
- PATH environment variable
However, some programs look into the current directory first, allowing us to hijack the search and make it load our DLL.
For a program to be able to elevate without user consent it has to:
- Be signed with a certificate from Microsoft.
- Be in a secure directory.
- Have the "AutoElevate" property in it's manifest.
A program which meets those conditions can elevate without a prompt on the default settings.
To recap, these are the conditions that allow bypassing UAC:
- Executable must be vulnerable to DLL hijacking.
- Executable must have the ability to auto-elevate.
- We have to be running a medium integrity process.
- User must be in the administrators group.
- UAC settings must be left on default values, or lower.
If all of these are fulfilled, the process of bypassing UAC is as follows:
- Copy our malicious DLL to a vulnerable program's directory.
- Execute the program, so it loads our malicious DLL.
The first step might seem impossible, seeing as we need to have admin privileges to copy files to protected locations, such as C:\Windows\System32. But quite conveniently, we can use the Windows Update Standalone Installer (wusa.exe) to unpack cabinet files into secure directories. That is possible because wusa can elevate to administrator without prompting the user.
The program we will be exploiting is called Mcx2Prov.exe. It is located in C:\Windows\ehome, and the malicious library needs to be called cryptbase.dll.
- Create our malicious DLL. We can write one ourselves, or use msfvenom. The DLL I am going to load will open Command Prompt. (Make sure the DLL has the correct bitness, and use x64 versions of payloads if needed. Use the command "systeminfo" to see system bitness.)
Syntax: msfvenom -p <payload> -f dll -o cryptbase.dll <payload options>
- Turn our DLL into a cabinet file. There is a tool on windows called makecab which will create the file for us.
Syntax: makecab <input file> <output file>
- Unpack the cabinet using wusa:
Syntax: wusa <input file> /extract:C:\Windows\ehome\
Be careful to use the absolute path to the cabinet file. You won't get an error if extracting fails, so double check everything worked correctly.
- Run Mcx2Prov.exe:
Pwned! There is another way to copy files, using code injection, and vulnerable executables vary by Windows version. Nevertheless, this exploit is quite reliable and easy to execute.
Here are exploitable programs available:
On Windows 7:
On Windows 8:
On Windows 8.1:
- C:\windows\System32\pwcreator.exe -> vds.exe
- C:\Program Files\Common Files\microsoft shared\ink\CRYPTBASE.dll
- C:\Program Files\Common Files\microsoft shared\ink\CRYPTSP.dll
- C:\Program Files\Common Files\microsoft shared\ink\dwmapi.dll
- C:\Program Files\Common Files\microsoft shared\ink\USERENV.dll
- C:\Program Files\Common Files\microsoft shared\ink\OLEACC.dll
- Do not unnecessarily give users admin rights.
- Set UAC to Always Notify (Extremely annoying).
Start your White-Hat Hacker journey with Null Byte's Beginner's Guide to Mastering Linux eBook.