User acount control options: https://learn.microsoft.com/en-us/windows/security/application-security/application-control/user-account-control/settings-and-configuration?tabs=intune
Technical explanation: https://learn.microsoft.com/en-us/windows/security/application-security/application-control/user-account-control/how-it-works
https://github.com/hfiref0x/UACME Project maintains a list of UAC bypasses
Let's use technique number 54, which is stated to work from Windows 10
build 14393. This technique targets the 32-bit version of the
auto-elevating binary SystemPropertiesAdvanced.exe. There are many trusted binaries that Windows will allow to auto-elevate without the need for a UAC consent prompt.
According to this blog post, the 32-bit version of SystemPropertiesAdvanced.exe attempts to load the non-existent DLL srrstr.dll, which is used by System Restore functionality.
When attempting to locate a DLL, Windows will use the following search order.
C:\\Windows\\System32 for 64-bit systems.C:\\Windows\\System (not supported on 64-bit systems)Show PATH:
cmd /c echo %PATH%