![]() |
Researcher Bypasses Windows UAC by Spoofing Trusted Directory - Printable Version +- Geeks for your information (https://www.geeks.fyi) +-- Forum: News (https://www.geeks.fyi/forumdisplay.php?fid=105) +--- Forum: Privacy & Security News (https://www.geeks.fyi/forumdisplay.php?fid=107) +--- Thread: Researcher Bypasses Windows UAC by Spoofing Trusted Directory (/showthread.php?tid=4486) |
Researcher Bypasses Windows UAC by Spoofing Trusted Directory - silversurfer - 12 November 18 Quote:A security researcher from Tenable, Inc. recently discovered that it is possible to bypass Windows’ User Account Control (UAC) by spoofing the execution path of a file in a trusted directory. Source: https://www.securityweek.com/researcher-bypasses-windows-uac-spoofing-trusted-directory |