Wietze
banner
wietzebeukema.nl
Wietze
@wietzebeukema.nl
Threat Detection & Response. Interested in cyber security, tech and politics. Views are my own, unless retweeted.
UAC bypass can be achieved by eg moving the legit perfmon.exe and a malicious atl.dll to "c:\windows \system32". Windows is tricked into thinking this is a safe/trusted directory, meaning perfmon will launch with high integrity and your DLL will be loaded. Several other executables are vulnerable!
June 13, 2025 at 12:04 PM
Bonus background reading: why do hidden files start with a dot on Linux?

💠 glenda.0x46.net/articles/dot...
A lesson in shortcuts - Rob Pike
glenda.0x46.net
June 12, 2025 at 9:02 AM