Windows Escalate UAC Protection...

- AV AC AU C I A
发布: 2017-10-12
修订: 2025-04-13

This Metasploit module will bypass Windows UAC by utilizing the trusted publisher certificate through process injection. It will spawn a second shell that has the UAC flag turned off by abusing the way "WinSxS" works in Windows systems. This Metasploit module uses the Reflective DLL Injection technique to drop only the DLL payload binary instead of three separate binaries in the standard technique. However, it requires the correct architecture to be selected, (use x64 for SYSWOW64 systems also).

0%
当前有1条漏洞利用/PoC
当前有0条受影响产品信息