Attacking the OS
Users Account Control (UACs)
Weak Permissions
Weak permission on File
Weak Service Permissions
Unquoted Service Path
Permissive Registry ACLs
Kernal Exploit
Vulnerable Application
Last updated