ThePirateWhoSmellsOfSunflowers

Results 32 comments of ThePirateWhoSmellsOfSunflowers

Same error as @Kruxinator, but your workaround is ok :+1: A little bit unrelated but on my W10 lab machine, i can't test the full chain because the .bat is...

Indeed, with Safecheck False, it's ok...well almost because now, I figure out that my VM seems to be patched against the exploit. Maybe you can add a check for patched...

@Clemenzah are you sure your system is vulnerable ?

Hi, Unfortunately, your module fails on my lab. On my W10 test machine: ![screenshot from 2018-10-04 21-38-59](https://user-images.githubusercontent.com/18633286/46498624-45c65500-c81e-11e8-85d7-7e0e0f6d8e5e.png) On Empire side: ``` (Empire: powershell/privesc/bypassuac_slui) > Job started: G2XR3U Property : {}...

On another test VM: ![uac](https://user-images.githubusercontent.com/18633286/46528923-4c43e380-c895-11e8-9558-8e92a394fe63.png) However if I use the ps1 alone, it works. :sunflower:

Weeeelllllll, I think I misunderstood. From the beginning I tried to use your module like a normal empire bypass UAC module : launch it and wait for the new agent...

I'll give a try to implement the correct method, I'll submit a new PR based on this one. :sunflower:

Hello, I had the same behavior during my last assessment. On an infected W10, it was impossible to use `management/spawn`, but `management/spawnas` with the same account was OK. Moreover `management/spawas`...

Hey, I quickly perform some tests but was unable to reproduce this behavior on my lab (W10 pro). 🌻

Hello, Same behavior here, webapp is barely usable with a room of 15+ members. Tested with Chromium snap ubuntu (110.0.5481.100) and uBlock Origin. :sunflower: