Skip to content

Escape -- Vulnlab (write-up)

Difficulty: Easy Box: Escape (Vulnlab) Author: dsec Date: 2025-09-06


TL;DR

Kiosk-style Windows box. Bypassed app restrictions by renaming cmd.exe to msedge.exe. Found admin creds. UAC bypass via Start-Process -Verb runAs.


Target info

- Host: 10.10.90.226

Initial access

Connected via RDP:

xfreerdp /v:10.10.90.226 -sec-nla

Desktop

Restricted environment

Found a key string: JWqkl6IDfQxXXmiHIKIP8ca0G9XxnWQZgvtPgON2vWc=

Renamed cmd.exe to msedge.exe and it opened -- bypassing the application whitelist.

cmd as msedge

Found creds: admin:Twisting3021

Creds

Logged in


Privilege escalation

Tried fodhelper UAC bypass -- didn't work.

fodhelper

fodhelper fail

Used Start-Process with -Verb runAs instead:

Start-Process powershell.exe -Verb runAs

Elevated shell

Confirmed admin is in the Administrators group:

net user admin

net user


Lessons & takeaways

  • Application whitelisting by process name is trivially bypassable by renaming executables
  • When fodhelper fails, Start-Process -Verb runAs can still elevate if the user is in the Administrators group