From 14dd6f8c360637ba35ebc0f2b42e1aed76004f1e Mon Sep 17 00:00:00 2001 From: CHA1NSK1 <96607632+Chainski@users.noreply.github.com> Date: Mon, 30 Jan 2023 12:35:24 -0500 Subject: [PATCH] Update README.md --- README.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/README.md b/README.md index 967d003..ff3d410 100644 --- a/README.md +++ b/README.md @@ -16,7 +16,7 @@

-ForceAdmin is a collection of Windows Scripting Languages which creates infinite UAC pop-ups until the user allows the program run. Any template can be used whether the [batch](https://github.com/Chainski/ForceAdmin/blob/main/ForceAdmin.bat) , [powershell](https://github.com/Chainski/ForceAdmin/blob/main/ForceAdmin.ps1) , [autoit](https://github.com/Chainski/ForceAdmin/blob/main/ForceAdmin.au3) or [vbs](https://github.com/Chainski/ForceAdmin/blob/main/ForceAdmin.vbs) file. +ForceAdmin is a collection scripts that utilizes Windows Scripting Languages which creates infinite UAC pop-ups until the user allows the program run. Any template can be used whether the [batch](https://github.com/Chainski/ForceAdmin/blob/main/ForceAdmin.bat) , [powershell](https://github.com/Chainski/ForceAdmin/blob/main/ForceAdmin.ps1) , [autoit](https://github.com/Chainski/ForceAdmin/blob/main/ForceAdmin.au3) or [vbs](https://github.com/Chainski/ForceAdmin/blob/main/ForceAdmin.vbs) file. The inserted commands are executed via Powershell that executes cmd.exe. This attack will force them to run as admin using bombardment (continuous loops). The only way out of this loop is allowing the application to execute as shown in the video below.