simonetaddei Posted November 16, 2015 Share Posted November 16, 2015 Hi, i use runasti64.exe to execute batch file that import a key in registry as trustedinstaller.now my question is if i can execute runasti64 without bring up this confirmation window? "Do you want to allow the following program from an unknown publisher to make changes to this computer?" thanks,Simone Link to comment Share on other sites More sharing options...
jaclaz Posted November 16, 2015 Share Posted November 16, 2015 Welcome to the wonderful world of UAC prompts .I mean not really-really "news" Possible way outs:https://www.raymond.cc/blog/task-scheduler-bypass-uac-prompt/ But possibly you might want to try other approaches, using the one or the other version of elevate.exe (or similar) or some other ways, start reading from around here:http://www.msfn.org/board/topic/173265-formatting-an-external-drive-using-different-interfaces/?p=1092535 jaclaz Link to comment Share on other sites More sharing options...
dencorso Posted November 16, 2015 Share Posted November 16, 2015 ElevatedShortcut by Winaero simply works!It'll create a shortcut, and one must run from the shortcut, of course. Link to comment Share on other sites More sharing options...
simonetaddei Posted November 19, 2015 Author Share Posted November 19, 2015 Hi, jaclaz, i read the article in the link, and then i decide to use elevate.exe to bypass the uac.i create this batch file to invoke elevate.exe and pass as parameter the file .cmd that do a reg import.elevate.exe C:\Users\simo\Desktop\esperimento\terza_versione\mynicecmd.cmd elevate.exe give me the correct permission to write key in registry and do it correctly, but it dont bypass the uac control and also show this message. where i'm wrong? thanksSimone Link to comment Share on other sites More sharing options...
jaclaz Posted November 19, 2015 Share Posted November 19, 2015 My guess is that to eliminate the prompt there are only two ways:1) a shortcut 2) use the schtasks task manager way In your batch to invoke the shortcut you need to use the START command:http://ss64.com/nt/start.htmlsomething *like*:START "" "C:\mypath\myshortcut.lnk"might do. jaclaz Link to comment Share on other sites More sharing options...
simonetaddei Posted November 19, 2015 Author Share Posted November 19, 2015 ok, i try to take the shortcut way and in this way shortcut bypass the uac control. but how can i do to pass the parameters to open mynicecmd.cmd rather the cmd.i try this way to pass as the parameter but it dont workSTART "" "C:\Users\simo\Desktop\esperimento\terza_versione\runasti64.lnk C:\Users\simo\Desktop\esperimento\terza_versione\mynicecmd.cmd" Link to comment Share on other sites More sharing options...
jaclaz Posted November 19, 2015 Share Posted November 19, 2015 Sure the argument(s) will need to be inserted inside the shortcut in the "Command line arguments" field:http://www.howtogeek.com/140737/create-a-shortcut-to-avoid-user-account-control-popups-the-easy-way/ In other words, first your shortcut must work when you double click on it, and only later you try starting it from a batch file (passing NO parameters to it). jaclaz Link to comment Share on other sites More sharing options...
simonetaddei Posted November 19, 2015 Author Share Posted November 19, 2015 ok it works,but given that the shortcut uses the task scheduler, if I want to make it work on another pc I need import the XML file of the task on the computer where i want the shortcut works.I searched online but it seems i can import task only if i have administration rights!there is a way to import the task whith normal user? or is there another way to bypass uac that work on other pc?thanks simone Link to comment Share on other sites More sharing options...
jaclaz Posted November 20, 2015 Share Posted November 20, 2015 Well, to run RunAsTI you need anyway to be Administrator, I would have thought that this was well established:https://github.com/jschicht/RunAsTIRequirement: Administrator. You do understand that one thing is giving back to an Authorized user (Administrator or Owner of an OS) some added powers that the good MS guys senselessly removed in some new OS versions and a completely different thing would be giving "full powers" to a "common user", don't you? The latter would be a rather serious "privilege escalation" vulnerability (and RunAsTI the corresponding exploit) jaclaz Link to comment Share on other sites More sharing options...
Recommended Posts
Create an account or sign in to comment
You need to be a member in order to leave a comment
Create an account
Sign up for a new account in our community. It's easy!
Register a new accountSign in
Already have an account? Sign in here.
Sign In Now