-
Notifications
You must be signed in to change notification settings - Fork 50
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
the uac bypass can be used now? #2
Comments
Hello GUANCAIBAN, I just did some testing on the full Windows 10 PRO In fact, the tool An example of a binary that is still vulnerable is Have a nice day :) |
Thanks for your reply,SecuProject. |
Oh,I mean that now I had know djoin.exe and dbgcore.dll can be used. |
Yeah!I know it's OK.Good job! |
I had test the uac bypass though the uacbypass'author(https://medium.com/tenable-techblog/uac-bypass-by-mocking-trusted-directories-24a96675f6e),but I can't execute the execute which in "C:\window \system32 "folder(although I can copy file to this folder)
so I think that the uac bypass had fixed.
I wondered if your way can use now?
Thanks!
The text was updated successfully, but these errors were encountered: