Cyborg Labs
Threat Hunt Deep Dives: User Account Control Bypass Via Registry Modification
User Account Control (UAC) Bypass is a clever method that can be used for privilege escalation either manually or via scripts and can be exploited
User Account Control (UAC) Bypass is a clever method that can be used for privilege escalation either manually or via scripts and can be exploited
Welcome to Threat Hunt Deep Dives, Episode 7! Today we are looking at the Registry Key Modification method, one that abuses registry keys by creating or modifying values that some trusted Windows executables look for during their process execution. Join us as we put this method under the microscope.