EmpireProject / Empire

Empire is a PowerShell and Python post-exploitation agent.
http://www.powershellempire.com/
BSD 3-Clause "New" or "Revised" License
7.39k stars 2.81k forks source link

Why Windows 7 UAC bypass is not accomplished? #1322

Open agrawalsmart7 opened 5 years ago

agrawalsmart7 commented 5 years ago

Hi, this is my environment.

attacker:- Kali linux(Empire)

Victim:- Windows 7

I got the agent with agent name. Then I renamed the original name to some other.

Next, When I type bypassuac http then it gives me this error or whatever you call.

Tasked <original name> to run Task_CMD_JOB

Agent <original name> tasked with task ID 8

Tasked agent <some other> to run module bypassuac_eventvwr

Now I saw in many blogs that in windows 7 they can easily privilege. Is there any problem with this. Am I missing something?

agrawalsmart7 commented 5 years ago

Also, this article says that Windows 7 is vulnerable to wscript privilege escalation attack. But still, I fail.

https://www.powershellempire.com/?page_id=380

ThePirateWhoSmellsOfSunflowers commented 5 years ago

Hi, Is your agent administrator ?

:sunflower:

agrawalsmart7 commented 5 years ago

Hi, Can I close this issue? Its solved now.

mr64bit commented 5 years ago

Yes, please do.

On Tue, Feb 19, 2019 at 4:53 AM agrawalsmart7 notifications@github.com wrote:

Hi, Can I close this issue? Its solved now.

— You are receiving this because you are subscribed to this thread. Reply to this email directly, view it on GitHub https://github.com/EmpireProject/Empire/issues/1322#issuecomment-465063771, or mute the thread https://github.com/notifications/unsubscribe-auth/ACFwUEZ0-rL15oPLhgYxK05zvn0oLxo4ks5vO8mGgaJpZM4agLcV .