UACMe v2.3 should bypass UAC from Windows 7 up to Windows 10 RS1 14367 build, am I wrong ?
=> Builds 14361, 14366, 14367 seem to have zero UAC related changes
UAC can be bypassed. There is a lot of mis-information about UAC. Plus, M$ has a wishy-washy history of fixing UAC bugs and vulnerabilities.
Honestly Microsoft must improve and revise the functionality of UAC, considering that the flow of concept is already expose hence its an easy bypass.
3rd party programs goes here.
I fully agree
(but we might let UAC at max)
Can ransomware encrypt raw unallocated space? eg: a 2gb chunk sitting between C drive and D drive.
I Never read about a
ransomware that does this.
They often only encrypt files that can have some sort of value or importance (with predefined extension), or all data on a drive (C: , D: , etc) , on cloud (if accessible) - without take care of file extension - to ask a ransom after the encyption.
But this is almost any time the same thing : loop on drives/files/folders and encrypt them (write on MBR for some ransomware).
On a "raw unloccated space", no name of drives/files/folders to put as parameter to their encrypting procedure.
That's only my point of view, I can be Wrong