Explore COM-based UAC bypass techniques in this 15-minute security conference talk from BSides London, where discover the intricacies of User Account Control vulnerabilities and learn how attackers leverage Component Object Model (COM) interfaces to circumvent Windows security controls.
Overview
Syllabus
Commanding Heights: Unmasking COM-Based UAC Bypass Techniques - Amankumar Badhel
Taught by
Security BSides London