Secondary Categories: 02 - Privilege Escalation - 02 - Malware - 02 - Persistence - 02 - Defense Evasion


Description:

If you have administrative access you can drop a wkscli.dll into C:\Windows and get a shell on logon under the context of explorer.exe.


Resources: