* Updated all Payloads for Version 1.2+ Fixed Style Issues on extensions and payloads. Added GET TARGET_OS to get.sh Removed and Fixed all uses ducky_helper.sh (Issue #248) Removed all mention of DUCKY_LANG (Issue #248) Renamed Payloads with spaces in name Added an extension to keep Macs Happy Added a payload for Mac DNS poisoning Fixed Issue #271 changed wget to curl -o Implemented PR #268 Implemented PR #273 * Fixed e.cmd * Fix e.cmd pt2 * Fixed Issues Fixed issues pointed out by @sebkinne Fixed styling errors
UACBypass / UACExploit - Download and executes any binary executable with administrator privileges WITHOUT UAC prompting for access
Author: @SkiddieTech Version: Version 1.1 Target: Windows 7 - Windows 10 (V1607)
Description
Download and executes any binary executable with administrator privileges WITHOUT prompting the user for administrator rights (aka UAC bypass/exploit) Please define URL and SAVEFILENAME in the a.vbs script Target does need internet connection Works on Windows 7 - Windows 10 The UAC bypass was patched in Win10 V.1607, the file will still execute but with normal user privliges However from what i am aware version 7,8 and 8.1 are still effected Currently fastest download and execute for HID attacks to date. (with UAC bypass)
Configuration
HID or HID STORAGE
Requirements
Target must be an Windows box with an working internet connection,powershell and vb script enabled (enabled by default) Please edit the a.vbs script with your binary payload URL and savename
STATUS
| LED | Status |
|---|---|
| Red | Script is starting |
| Green | Finished |