assume-breach 1063d0ba71 Add files via upload 3 роки тому
..
HighBorn 1063d0ba71 Add files via upload 3 роки тому
packages 8c33f4623b Add files via upload 3 роки тому
HighBorn.c 80fc118931 Create HighBorn.c 3 роки тому
HighBorn.cs 79a850e843 Update HighBorn.cs 3 роки тому
HighBorn.sln 34d2577101 Add files via upload 3 роки тому
ReadMe.md 7e8758f3a9 Update ReadMe.md 3 роки тому

ReadMe.md

Windows UAC Bypass utilizing mock directories and DLL Hijacking. This is a tool that I created to use with the "dotnet inline-execution" command on Havoc C2, but it can be used with any C2 that has in-memory execution. This was just a quick and dirty POC.

Usage:

Open the highborn.c file in a text editor on your Kali box.

Replace the file path with the file path of the executable that you want to open (ie your dropper).

Compile HighBorn.c into a dll.

linux command: "x86_64-w64-mingw32-gcc -shared -o secur32.dll HighBorn.c -lcomctl32 -Wl,--subsystem,windows"

Host the dll on your Kali box.

command: python3 -m http.server PORT

Compile on Kali

apt install mono-complete -y mcs -out:HighBorn.exe Highborn.cs

Execute on C2

command: dotnet inline-execute HighBorn.exe

Replace the ComputerDefaults.exe and secur32.dll with other EXEs and DLLs as you find DLLs that can be hijacked. ComputerDefaults is a popular one so it is probably monitored pretty closely.