SpecterOps
@SpecterOps
Know Your Adversary - Adversary Simulation | Detection | Resilience
26-01-2017 21:02:22
2,3K Tweets
35,5K Followers
379 Following
While Microsoft's User Account Control is not defined as a security boundary, bypassing UAC is still something attackers frequently do. Check out this blog post from Matt Nelson detailing one method for bypassing UAC using App Paths. ghst.ly/43U8XQY