Path: blob/master/payloads/library/execution/-RD-UrAttaControl/README.md
3018 views
UrAttaControl
A script used to open an elevated powershell console and execute admin level commands
Description
Completely ran from the execute file. Replace the URL in that file with yours leading to a base64 script
This script will use IEX to download a base64 script to the $Payload variable
Using a keystroke injections attack a heavily obfuscated and encoded snippet will download and execute any base64
script saved in the $Payload variable
This payload completely bypasses the UAC and will run any admin level script without a prompt
You can use this function I wrote to convert your .ps1 sscripts to Base64
https://github.com/I-Am-Jakoby/PowerShell-for-Hackers/blob/main/Functions/B64.md
Getting Started
Dependencies
DropBox or other file sharing service - Your Shared link for the intended file
Windows 10,11
Executing program
Plug in your device
A keystroke injection based payload will run
Contributing
All contributors names will be listed here
I am Jakoby
Version History
0.1
Initial Release
Contact
I am Jakoby
Project Link: [https://github.com/I-Am-Jakoby/hak5-submissions/tree/main/RubberDucky/Payloads/RD-UrAttaControl)