소스 검색

Update ReadMe.md

Added documentation walkthrough link.
assume-breach 3 년 전
부모
커밋
2c2342e54a
1개의 변경된 파일3개의 추가작업 그리고 0개의 파일을 삭제
  1. 3 0
      HighBorn/ReadMe.md

+ 3 - 0
HighBorn/ReadMe.md

@@ -38,3 +38,6 @@ Execute on C2
 **command: dotnet inline-execute HighBorn.exe**
 
 Replace the ComputerDefaults.exe and secur32.dll with other EXEs and DLLs as you find DLLs that can be hijacked. ComputerDefaults is a popular one so it is probably monitored pretty closely.
+
+Still need help? I've documented the whole process here:
+https://assume-breach.medium.com/home-grown-red-team-uac-bypass-on-windows-defender-for-endpoint-with-highborn-e9ea16546029