From ad3f02d6b32ea8b015b09469218182c05818c981 Mon Sep 17 00:00:00 2001 From: Muhammad Talha Khan Date: Wed, 9 Jan 2019 21:13:17 +0500 Subject: [PATCH] Update README.md --- payloads/UAC Bypass/README.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/payloads/UAC Bypass/README.md b/payloads/UAC Bypass/README.md index 0de9d6d..1053e9b 100644 --- a/payloads/UAC Bypass/README.md +++ b/payloads/UAC Bypass/README.md @@ -1,7 +1,7 @@ # UAC Bypass ### Description: -UAC Bypass using simple methods available in Windows. Nothing fancy just good old simple workarounds. +UAC Bypass using simple methods available in Windows. There is nothing fancy just good old simple workarounds. It is not required to bypass UAC using these methods because you can simple send ALT+Y in HID attacks and say yes on user behalf but nothing is wrong with having some fun. **1.** UAC_BYPASS_MSCONFIG.ino:
UAC Bypass using msconfig. Starts msconfig throw some keys and launch cmd in Admin mode. For the sake of POC it executes regedit and stops. You can add customize is according to your requirements ;)