ソースを参照

Update ReadMe.md

Added documentation walkthrough link.
assume-breach 3 年 前
コミット
2c2342e54a
1 ファイル変更3 行追加0 行削除
  1. 3 0
      HighBorn/ReadMe.md

+ 3 - 0
HighBorn/ReadMe.md

@@ -38,3 +38,6 @@ Execute on C2
 **command: dotnet inline-execute HighBorn.exe**
 
 Replace the ComputerDefaults.exe and secur32.dll with other EXEs and DLLs as you find DLLs that can be hijacked. ComputerDefaults is a popular one so it is probably monitored pretty closely.
+
+Still need help? I've documented the whole process here:
+https://assume-breach.medium.com/home-grown-red-team-uac-bypass-on-windows-defender-for-endpoint-with-highborn-e9ea16546029