Nothing Special   »   [go: up one dir, main page]

Skip to content

Latest commit

 

History

History
 
 

HighBorn

Folders and files

NameName
Last commit message
Last commit date

parent directory

..
 
 
 
 
 
 
 
 
 
 
 
 

Windows UAC Bypass utilizing mock directories and DLL Hijacking. This is a tool that I created to use with the "dotnet inline-execution" command on Havoc C2, but it can be used with any C2 that has in-memory execution. SharpSploit's ETW Bypass has been added to evade Defender/AV/EDR. This was just a quick and dirty POC.

Usage:

Open the highborn.c file in a text editor on your Kali box.

Replace the file path with the file path of the executable that you want to open (ie your dropper).

Compile HighBorn.c into a dll.

linux command: "x86_64-w64-mingw32-gcc -shared -o secur32.dll HighBorn.c -lcomctl32 -Wl,--subsystem,windows"

Host the dll on your Kali box.

command: python3 -m http.server PORT

Compiling HighBorn On Visual Studio

git clone https://github.com/cobbr/SharpSploit.git

Compile SharpSploit by changing the build to Release and then click Build.

Open the HighBorn sln file. Right click on "Add Reference" and then click "Browse."

Go to your SharpSploit compiled folder and in "Release" click on the SharpSploit.dll file to add it to HighBorn.

Now compile HighBorn by changing the build tab to Release.

Compiling HighBorn Withoug ETW Bypass On Linux

Remove the SharpSploit references in the HighBorn.cs file.

apt install mono-complete -y mcs -out:HighBorn.exe Highborn.cs

Execute on C2

command: dotnet inline-execute HighBorn.exe

Replace the ComputerDefaults.exe and secur32.dll with other EXEs and DLLs as you find DLLs that can be hijacked. ComputerDefaults is a popular one so it is probably monitored pretty closely.

Still need help? I've documented the whole process here: https://assume-breach.medium.com/home-grown-red-team-uac-bypass-on-windows-defender-for-endpoint-with-highborn-e9ea16546029