EoP - AlwaysInstallElevated
Exploiting AlwaysInstallElevated Policy: A Guide
Key Concept: AlwaysInstallElevated Policy
Step 1: Checking Registry Values
1.1 User Registry Key
cmdCopy codereg query HKCU\SOFTWARE\Policies\Microsoft\Windows\Installer /v AlwaysInstallElevatedplaintextCopy codeAlwaysInstallElevated REG_DWORD 0x11.2 Machine Registry Key
cmdCopy codereg query HKLM\SOFTWARE\Policies\Microsoft\Windows\Installer /v AlwaysInstallElevatedStep 2: Creating the MSI Package
Using msfvenom to Create a Malicious MSI
msfvenom to Create a Malicious MSICustom Payloads
Step 3: Installing the MSI Package
Step 4: Automating with Metasploit or PowerUp
4.1 Metasploit
4.2 PowerUp Script
Security Implications
Impact of Exploitation
Mitigation Strategies
1. Disable AlwaysInstallElevated
2. Least Privilege
3. Audit and Monitor
References
Last updated