Jump to content
Strawberry Orange Banana Lime Leaf Slate Sky Blueberry Grape Watermelon Chocolate Marble
Strawberry Orange Banana Lime Leaf Slate Sky Blueberry Grape Watermelon Chocolate Marble

MSFN is made available via donations, subscriptions and advertising revenue. The use of ad-blocking software hurts the site. Please disable ad-blocking software or set an exception for MSFN. Alternatively, register and become a site sponsor/subscriber and ads will be disabled automatically. 


simonetaddei

how to use runasti64.exe without it asking for confirmation?

Recommended Posts

Hi, i use runasti64.exe to execute batch file that import a key in registry as trustedinstaller.

now my question is if i can execute runasti64 without bring up this confirmation window?

 

"Do you want to allow the following program from an unknown publisher to make changes to this computer?"

 

thanks,

Simone

Share this post


Link to post
Share on other sites

Welcome :) to the wonderful world of UAC prompts :w00t::ph34r:.

I mean not really-really "news" :no:

 

Possible way outs:

https://www.raymond.cc/blog/task-scheduler-bypass-uac-prompt/

 

But possibly you might want to try other approaches, using the one or the other version of elevate.exe (or similar) or some other ways, start reading from around here:

http://www.msfn.org/board/topic/173265-formatting-an-external-drive-using-different-interfaces/?p=1092535

 

 

jaclaz

Share this post


Link to post
Share on other sites

Hi, jaclaz, i read the article in the link, and then i decide to use elevate.exe to bypass the uac.

i create this batch file to invoke elevate.exe and pass as parameter the file .cmd that do a reg import.

elevate.exe C:\Users\simo\Desktop\esperimento\terza_versione\mynicecmd.cmd 

elevate.exe give me the correct permission to write key in registry and do it correctly, but it dont bypass the uac control and also show this message.

 

post-410805-0-62835900-1447946809_thumb.

 

where i'm wrong?

 

thanks

Simone

Share this post


Link to post
Share on other sites

My guess :unsure: is that to eliminate the prompt there are only two ways:

1) a shortcut 

2) use the schtasks task manager way

 

In your batch to invoke the shortcut you need to use the START command:

http://ss64.com/nt/start.html

something *like*:

START "" "C:\mypath\myshortcut.lnk"

might do.

 

jaclaz

Share this post


Link to post
Share on other sites

ok, i try to take the shortcut way and in this way shortcut bypass the uac control.

 

but how can i do to pass the parameters to open mynicecmd.cmd rather the cmd.

i try this way to pass as the parameter but it dont work

START "" "C:\Users\simo\Desktop\esperimento\terza_versione\runasti64.lnk C:\Users\simo\Desktop\esperimento\terza_versione\mynicecmd.cmd"

post-410805-0-87890300-1447953358_thumb.

Share this post


Link to post
Share on other sites

Sure the argument(s) will need to be inserted inside the shortcut in the "Command line arguments" field:

http://www.howtogeek.com/140737/create-a-shortcut-to-avoid-user-account-control-popups-the-easy-way/

elevated_shortcut_3.png

 

In other words, first your shortcut must work when you double click on it, and only later you try starting it from a batch file (passing NO parameters to it).

 

jaclaz

Share this post


Link to post
Share on other sites

ok it works,

but given that the shortcut uses the task scheduler, if I want to make it work on another pc I need import the XML file of the task on the computer where i want the shortcut works.

I searched online but it seems i can import task only if i have administration rights!

there is a way to import the task whith normal user? or is there another way to bypass uac that work on other pc?

thanks simone

Share this post


Link to post
Share on other sites

Well, to run RunAsTI you need anyway to be Administrator, I would have thought that this was well established:

https://github.com/jschicht/RunAsTI

Requirement: Administrator.

 

 

You do understand that one thing is giving back to an Authorized user (Administrator or Owner of an OS) some added powers that the good MS guys senselessly removed in some new OS versions and a completely different thing would be giving "full powers" to a "common user", don't you?

 

The latter would be a rather serious "privilege escalation" vulnerability (and RunAsTI the corresponding exploit) :ph34r:

 

jaclaz

Share this post


Link to post
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Restore formatting

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.


  • Recently Browsing   0 members

    No registered users viewing this page.

×
×
  • Create New...