profile-img
SpecterOps

@SpecterOps

Know Your Adversary - Adversary Simulation | Detection | Resilience

calendar_today26-01-2017 21:02:22

2,3K Tweets

35,5K Followers

379 Following

SpecterOps(@SpecterOps) 's Twitter Profile Photo

While Microsoft's User Account Control is not defined as a security boundary, bypassing UAC is still something attackers frequently do. Check out this blog post from Matt Nelson detailing one method for bypassing UAC using App Paths. ghst.ly/43U8XQY

account_circle