UAC Bypass
Last updated
Last updated
More about UAC in theory you can read here [LINK]
Here you would be looking more into UAC Bypasses, because every account. even elevated one have two types of tokens, low and high privilege. And sometimes after we got some high-privilege user we need to bypass UAC to actually use high-privilege token. Here I would write about UAC techniques I used during machines or engagements.
Very useful is UACME repository
Also this repo is useful