We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
There was an error while loading. Please reload this page.
1 parent ebf5121 commit b8243b5Copy full SHA for b8243b5
modules/exploits/windows/local/bypassuac_eventvwr.rb
@@ -28,7 +28,7 @@ def initialize(info={})
28
'Name' => 'Windows Escalate UAC Protection Bypass (Via Eventvwr Registry Key)',
29
'Description' => %q{
30
This module will bypass Windows UAC by hijacking a special key in the Registry under
31
- the current user hive, and inserting a custom command that will get invokved when
+ the current user hive, and inserting a custom command that will get invoked when
32
the Windows Event Viewer is launched. It will spawn a second shell that has the UAC
33
flag turned off.
34
0 commit comments