Microsoft Windows 10 UAC Protection Bypass Via Windows Store
Posted by deepcore on September 7, 2019 – 2:48 am
This Metasploit module exploits a flaw in the WSReset.exe Windows Store Reset Tool. The tool is run with the “autoElevate” property set to true, however it can be moved to a new Windows directory containing a space (C:Windows System32) where, upon execution, it will load our payload dll (propsys.dll).
Post a reply
You must be logged in to post a comment.