modules/exploits/windows/local/bypassuac_silentcleanup.rb
Method initialize
has 32 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def initialize(info = {})
super(update_info(info,
'Name' => 'Windows Escalate UAC Protection Bypass (Via SilentCleanup)',
'Description' => %q{
There's a task in Windows Task Scheduler called "SilentCleanup" which, while it's executed as Users, automatically runs with elevated privileges.