Just dropped a deep dive on reversing ICMLuaUtil and uncovering the lesser-known CallCustomActionDll path for elevated DLL execution.
#ReverseEngineering #WindowsInternals #UACBypass
1
2
“consent.exe” is the “Consent UI for Administrative Applications” which is called as part of a UAC (User Account Control) flow…
From medium.com“smss.exe” is the first user-mode process which is executed from %SystemRoot%\System32\smss.exe and it’s part of Windows since Windows NT…
From medium.com