I don't see the bypass, where is it located on the task manager, also task manager should have run as administrator to see all processes, malware will not appear unless "Show Process from All Users" is running.You should use Microsoft Process Monitor to record all process instead using task manager and have it running before Server.exe is started to show that nothing was running before you click Server.exe.
I tried to run this Server.exe on Windows 8.1x64 and it does not run at all. No UAC prompts displayed. Nothing at all was running on the system and no network connections or anything. I had to disable Windows Defender which detected it as a hack tool, SmartScreen also blocked it. I used Process Hacker and Microsoft Process Monitor to record all running processes and nothing at all was recorded. There was no changes made to the system either probably the reason why UAC didn't display a prompt.
So I disabled UAC, SmartScreen and Windows Defender then rebooted and tried to run it again without any protection.
Still nothing it would not run and gave no errors at all no matter how many times that I tried to run it.
So I'm thinking either it is blocked by a recent Windows Update patch or doesn't support x64 systems.
I even tried to load it in a debugger and nothing was displayed.
So I downloaded the file again to make sure I didn't get a corrupted file and extracted it without any protection and still it would not run.
Enjoy!!
Nicely said.
Thing is that as i mentioned in the previous posts that UAC cannot be bypassed from the internet.
So imagine some malware on a webpage, which is loaded with a bypass kinda like payload, then this malware cannot penetrate the system like a drive-by. In nearly 95% of all the cases the code needs to be injected (Merged) within a legit file to gain entree to the victims pc. So here you got your second example that a user needs to facilitate the infection itself in order for it to work.
Also the victims pc needs to fit a certain criteria to be able to be infected in the first place, because action number 3 a user needs to do before their pc can get infected is actually opening the file (or the carrier file).
So thats 3 actions a user needs to take inorder to have ANY bypass work and still this is not a 100% thingy.
There simply is not malware out there that spreads over the net capable of bypassing the UAC without user intervention.
However there are several ones that can bypass it, in a specific scenario and according to specific criteria.
The video shown by ifacedown shows that the "user" activates the "file/malware" which again is a user based action.
Windows has never been designed to protect itself from dangers within, the whole point of UAC is to warn a user against most foreign dangers (considering the pc domestic) and to some critical actions internally.
So any fool can write a exploit to shut down UAC, and execute it by hand, but if you are the hacker and you want to bypass the UAC from your victims pc 2000 miles away... good luck with that.
As its not going to happen anytime soon, unless the person is running stone age windows, on a flinstone config and indian raindance protection ..lmao.
That being said lets assume that there would be a malware on the net that could bypass the UAC core and policy engine, then i can guarantee that this would NOT be possible on a computer running the latest updates, internet security and common sense.
No in order for this to work, you need a person that pickes up a pen to write a email, on the screen while their keyboard is in front of them lmao.
So if you can find that person? then he deserves to be bypassed.
But hey thats just me saying it... but then again what do i know...^^
