prompt
stringclasses 508
values | procedure
stringlengths 20
478
|
---|---|
Abuse Elevation Control Mechanism:Bypass User Account Control | AppleJeus has presented the user with a UAC prompt to elevate privileges while installing. |
Abuse Elevation Control Mechanism:Bypass User Account Control | It has bypassed UAC. |
Abuse Elevation Control Mechanism:Bypass User Account Control | It has a function in the initial dropper to bypass Windows UAC in order to execute the next payload with higher privileges. |
Abuse Elevation Control Mechanism:Bypass User Account Control | AutoIt backdoor attempts to escalate privileges by bypassing User Access Control. |
Abuse Elevation Control Mechanism:Bypass User Account Control | Avaddon bypasses UAC using the CMSTPLUA COM interface. |
Abuse Elevation Control Mechanism:Bypass User Account Control | Bad Rabbit has attempted to bypass UAC and gain elevated administrative privileges. |
Abuse Elevation Control Mechanism:Bypass User Account Control | BADHATCH can utilize the CMSTPLUA COM interface and the SilentCleanup task to bypass UAC. |
Abuse Elevation Control Mechanism:Bypass User Account Control | BitPaymer can suppress UAC prompts by setting the HKCU\Software\Classes\ms-settings\shell\open\command registry key on Windows 10 or HKCU\Software\Classes\mscfile\shell\open\command on Windows 7 and launching the eventvwr.msc process, which launches BitPaymer with elevated privileges. |
Abuse Elevation Control Mechanism:Bypass User Account Control | BlackCat can bypass UAC to escalate privileges. |
Abuse Elevation Control Mechanism:Bypass User Account Control | BlackEnergy attempts to bypass default User Access Control (UAC) settings by exploiting a backward-compatibility setting found in Windows 7 and later. |
Abuse Elevation Control Mechanism:Bypass User Account Control | It has used a Windows 10 specific tool and xxmm to bypass UAC for privilege escalation. |
Abuse Elevation Control Mechanism:Bypass User Account Control | Bumblebee has the ability to bypass UAC to deploy post exploitation tools with elevated privileges. |
Abuse Elevation Control Mechanism:Bypass User Account Control | Clambling has the ability to bypass UAC using a passuac.dll file. |
Abuse Elevation Control Mechanism:Bypass User Account Control | It has bypassed UAC. |
Abuse Elevation Control Mechanism:Bypass User Account Control | Cobalt Strike can use a number of known techniques to bypass Windows UAC. |
Abuse Elevation Control Mechanism:Bypass User Account Control | CSPY Downloader can bypass UAC using the SilentCleanup task to execute the binary with elevated privileges. |
Abuse Elevation Control Mechanism:Bypass User Account Control | Downdelph bypasses UAC to escalate privileges by using a custom "RedirectEXE" shim database. |
Abuse Elevation Control Mechanism:Bypass User Account Control | It has used the Fodhelper UAC bypass technique to gain elevated privileges. |
Abuse Elevation Control Mechanism:Bypass User Account Control | Empire includes various modules to attempt to bypass UAC for escalation of privileges. |
Abuse Elevation Control Mechanism:Bypass User Account Control | It has used PowerShell to bypass UAC. |
Abuse Elevation Control Mechanism:Bypass User Account Control | FinFisher performs UAC bypass. |
Abuse Elevation Control Mechanism:Bypass User Account Control | Gelsemium can bypass UAC to elevate process privileges on a compromised host. |
Abuse Elevation Control Mechanism:Bypass User Account Control | Grandoreiro can bypass UAC by registering as the default handler for .MSC files. |
Abuse Elevation Control Mechanism:Bypass User Account Control | H1N1 bypasses user access control by using a DLL hijacking vulnerability in the Windows Update Standalone Installer (wusa.exe). |
Abuse Elevation Control Mechanism:Bypass User Account Control | InvisiMole can use fileless UAC bypass and create an elevated COM object to escalate privileges. |
Abuse Elevation Control Mechanism:Bypass User Account Control | Koadic has 2 methods for elevating integrity. It can bypass UAC through eventvwr.exe and sdclt.exe. |
Abuse Elevation Control Mechanism:Bypass User Account Control | KOCTOPUS will perform UAC bypass either through fodhelper.exe or eventvwr.exe. |
Abuse Elevation Control Mechanism:Bypass User Account Control | KONNI has bypassed UAC by performing token impersonation as well as an RPC-based method, this included bypassing UAC set to "AlwaysNotify". |
Abuse Elevation Control Mechanism:Bypass User Account Control | Lokibot has utilized multiple techniques to bypass UAC. |
Abuse Elevation Control Mechanism:Bypass User Account Control | It uses various techniques to bypass UAC. |
Abuse Elevation Control Mechanism:Bypass User Account Control | During Operation Honeybee, the threat actors used the malicious NTWDBLIB.DLL and cliconfig.exe to bypass UAC protections. |
Abuse Elevation Control Mechanism:Bypass User Account Control | It bypassed User Access Control (UAC). |
Abuse Elevation Control Mechanism:Bypass User Account Control | PipeMon installer can use UAC bypass techniques to install the payload. |
Abuse Elevation Control Mechanism:Bypass User Account Control | An older variant of PLAINTEE performs UAC bypass. |
Abuse Elevation Control Mechanism:Bypass User Account Control | PoshC2 can utilize multiple methods to bypass UAC. |
Abuse Elevation Control Mechanism:Bypass User Account Control | Pupy can bypass Windows UAC through either DLL hijacking, eventvwr, or appPaths. |
Abuse Elevation Control Mechanism:Bypass User Account Control | QuasarRAT can generate a UAC pop-up Window to prompt the target user to run a command as the administrator. |
Abuse Elevation Control Mechanism:Bypass User Account Control | Ramsay can use UACMe for privilege escalation. |
Abuse Elevation Control Mechanism:Bypass User Account Control | RCSession can bypass UAC to escalate privileges. |
Abuse Elevation Control Mechanism:Bypass User Account Control | Remcos has a command for UAC bypassing. |
Abuse Elevation Control Mechanism:Bypass User Account Control | It can attempt to run the program as admin, then show a fake error message and a legitimate UAC bypass prompt to the user in an attempt to socially engineer the user into escalating privileges. |
Abuse Elevation Control Mechanism:Bypass User Account Control | Saint Bot has attempted to bypass UAC using fodhelper.exe to escalate privileges. |
Abuse Elevation Control Mechanism:Bypass User Account Control | Sakula contains UAC bypass code for both 32- and 64-bit systems. |
Abuse Elevation Control Mechanism:Bypass User Account Control | Shamoon attempts to disable UAC remote restrictions by modifying the Registry. |
Abuse Elevation Control Mechanism:Bypass User Account Control | ShimRat has hijacked the cryptbase.dll within migwiz.exe to escalate privileges. This prevented the User Access Control window from appearing. |
Abuse Elevation Control Mechanism:Bypass User Account Control | SILENTTRINITY contains a number of modules that can bypass UAC, including through Window's Device Manager, Manage Optional Features, and an image hijack on the .msc file extension. |
Abuse Elevation Control Mechanism:Bypass User Account Control | A It tool can use a public UAC bypass method to elevate privileges. |
Abuse Elevation Control Mechanism:Bypass User Account Control | UACMe contains many methods for bypassing Windows User Account Control on multiple versions of the operating system. |
Abuse Elevation Control Mechanism:Bypass User Account Control | WarzoneRAT can use sdclt.exe to bypass UAC in Windows 10 to escalate privileges; for older Windows versions WarzoneRAT can use the IFileOperation exploit to bypass the UAC module. |
Abuse Elevation Control Mechanism:Bypass User Account Control | WastedLocker can perform a UAC bypass if it is not executed with administrator rights or if the infected host runs Windows Vista or later. |
Abuse Elevation Control Mechanism:Bypass User Account Control | Winnti for Windows can use a variant of the sysprep UAC bypass. |
Abuse Elevation Control Mechanism:Bypass User Account Control | Many ZeroT samples can perform UAC bypass by using eventvwr.exe to execute a malicious file. |
Abuse Elevation Control Mechanism:Sudo and Sudo Caching | Cobalt Strike can use sudo to run a command. |
Abuse Elevation Control Mechanism:Sudo and Sudo Caching | Dok adds admin ALL=(ALL) NOPASSWD: ALL to the /etc/sudoers file. |
Abuse Elevation Control Mechanism:Sudo and Sudo Caching | Proton modifies the tty_tickets line in the sudoers file. |
Abuse Elevation Control Mechanism:Elevated Execution with Prompt | OSX/Shlayer can escalate privileges to root by asking the user for credentials. |
Access Token Manipulation | AppleSeed can gain system level privilege by passing SeDebugPrivilege to the AdjustTokenPrivilege API. |
Access Token Manipulation | BlackCat has the ability modify access tokens. |
Access Token Manipulation | It has used JuicyPotato to abuse the SeImpersonate token privilege to escalate from web application pool accounts to NT Authority\SYSTEM. |
Access Token Manipulation | During C0017, It used a ConfuserEx obfuscated BADPOTATO exploit to abuse named-pipe impersonation for local NT AUTHORITY\SYSTEM privilege escalation. |
Access Token Manipulation | Cuba has used SeDebugPrivilege and AdjustTokenPrivileges to elevate privileges. |
Access Token Manipulation | Duqu examines running system processes for tokens that have specific system privileges. If it finds one, it will copy the token and store it for later use. Eventually it will start new processes with the stored token attached. It can also steal tokens to acquire administrative privileges. |
Access Token Manipulation | Empire can use PowerSploit's Invoke-TokenManipulation to manipulate access tokens. |
Access Token Manipulation | It has used has used Metasploit’s named-pipe impersonation technique to escalate privileges. |
Access Token Manipulation | Gelsemium can use token manipulation to bypass UAC on Windows7 systems. |
Access Token Manipulation | HermeticWiper can use AdjustTokenPrivileges to grant itself privileges for debugging with SeDebugPrivilege, creating backups with SeBackupPrivilege, loading drivers with SeLoadDriverPrivilege, and shutting down a local system with SeShutdownPrivilege. |
Access Token Manipulation | Hydraq creates a backdoor through which remote attackers can adjust token privileges. |
Access Token Manipulation | KillDisk has attempted to get the access token of a process by calling OpenProcessToken. If KillDisk gets the access token, then it attempt to modify the token privileges with AdjustTokenPrivileges. |
Access Token Manipulation | Mafalda can use AdjustTokenPrivileges() to elevate privileges. |
Access Token Manipulation | MegaCortex can enable SeDebugPrivilege and adjust token privileges. |
Access Token Manipulation | PoshC2 can use Invoke-TokenManipulation for manipulating tokens. |
Access Token Manipulation | PowerSploit's Invoke-TokenManipulation Exfiltration module can be used to manipulate tokens. |
Access Token Manipulation | Ryuk has attempted to adjust its token privileges to have the SeDebugPrivilege. |
Access Token Manipulation | Sliver has the ability to manipulate user tokens on targeted Windows systems. |
Access Token Manipulation | SslMM contains a feature to manipulate process privileges and tokens. |
Access Token Manipulation | SUNSPOT modified its security token to grants itself debugging privileges by adding SeDebugPrivilege. |
Access Token Manipulation:Token Impersonation | It has used CVE-2015-1701 to access the SYSTEM token and copy it into the current process as part of privilege escalation. |
Access Token Manipulation:Token Impersonation | Aria-body has the ability to duplicate a token from ntprint.exe. |
Access Token Manipulation:Token Impersonation | BADHATCH can impersonate a lsass.exe or vmtoolsd.exe token. |
Access Token Manipulation:Token Impersonation | BitPaymer can use the tokens of users to create processes on infected systems. |
Access Token Manipulation:Token Impersonation | Cobalt Strike can steal access tokens from exiting processes. |
Access Token Manipulation:Token Impersonation | Emotet has the ability to duplicate the user’s token. |
Access Token Manipulation:Token Impersonation | It has used a malicious framework designed to impersonate the lsass.exe/vmtoolsd.exe token. |
Access Token Manipulation:Token Impersonation | FinFisher uses token manipulation with NtFilterToken as part of UAC bypass. |
Access Token Manipulation:Token Impersonation | Okrum can impersonate a logged-on user's security context using a call to the ImpersonateLoggedOnUser API. |
Access Token Manipulation:Token Impersonation | Pupy can obtain a list of SIDs and provide the option for selecting process tokens to impersonate. |
Access Token Manipulation:Token Impersonation | REvil can obtain the token from the user that launched the explorer.exe process to avoid affecting the desktop of the SYSTEM user. |
Access Token Manipulation:Token Impersonation | Shamoon can impersonate tokens using LogonUser, ImpersonateLoggedOnUser, and ImpersonateNamedPipeClient. |
Access Token Manipulation:Token Impersonation | SILENTTRINITY can find a process owned by a specific user and impersonate the associated token. |
Access Token Manipulation:Token Impersonation | Siloscape impersonates the main thread of CExecSvc.exe by calling NtImpersonateThread. |
Access Token Manipulation:Token Impersonation | Stuxnet attempts to impersonate an anonymous token to enumerate bindings in the service control manager. |
Access Token Manipulation:Token Impersonation | Tarrask leverages token theft to obtain lsass.exe security permissions. |
Access Token Manipulation:Create Process with Token | Aria-body has the ability to execute a process using runas. |
Access Token Manipulation:Create Process with Token | Azorult can call WTSQueryUserToken and CreateProcessAsUser to start a new process with local system privileges. |
Access Token Manipulation:Create Process with Token | Bankshot grabs a user token using WTSQueryUserToken and then creates a process by impersonating a logged-on user. |
Access Token Manipulation:Create Process with Token | Empire can use Invoke-RunAs to make tokens. |
Access Token Manipulation:Create Process with Token | KONNI has duplicated the token of a high integrity process to spawn an instance of cmd.exe under an impersonated user. |
Access Token Manipulation:Create Process with Token | It keylogger KiloAlfa obtains user tokens from interactive sessions to execute itself with API call CreateProcessAsUserA under that user's context. |
Access Token Manipulation:Create Process with Token | PipeMon can attempt to gain administrative privileges using token impersonation. |
Access Token Manipulation:Create Process with Token | PoshC2 can use Invoke-RunAs to make tokens. |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.