From 689c3b1fea6893afe557eccc71cdd4edabc96897 Mon Sep 17 00:00:00 2001 From: "Chris \"Lopi\" Spehn" Date: Tue, 4 Aug 2020 07:40:48 -0600 Subject: [PATCH] Update Regsvcs.yml Fixed inaccurate permissions --- yml/OSBinaries/Regsvcs.yml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/yml/OSBinaries/Regsvcs.yml b/yml/OSBinaries/Regsvcs.yml index d164ef2..274d275 100644 --- a/yml/OSBinaries/Regsvcs.yml +++ b/yml/OSBinaries/Regsvcs.yml @@ -16,7 +16,7 @@ Commands: Description: Loads the target .DLL file and executes the RegisterClass function. Usecase: Execute dll file and bypass Application whitelisting Category: AWL bypass - Privileges: User + Privileges: Local Admin MitreID: T1121 MitreLink: https://attack.mitre.org/wiki/Technique/T1121 OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10