So you are finally going to make a video where you penetrate a
REMOTE windows OS that:
1: Is totally updated and configured.
2: DEP is on.
3: UAC is on.
4: Internet Security Software + firewall enabled.
5: Third party software updated.
6: Is connected trough a network with Hardware based firewall?
7: And you are using STRICTLY your exploit and nothing else to penetrate the system.
7: And most importantly has NOT been changed to allow your programs to work?
If any of these conditions fail this would mean your video is worthless.
Again i respect your knowledge when it comes to exploits, some of the things you said are valid and spot on, and i will be the first to admit that UAC can be bypassed both internal and external, however to achieve this MANY things have happened before this would be possible in the first place.
The point i am trying to make is simple: A standard windows using the config i have mentioned will not allow your exploit to change the UAC without: Warning, Logging or even blocking it. (This includes internet security and all other standard protection)
Obviously ANY PC can be infected if the user is click happy but if the user is paying attention to his PC then your exploit will fail (And no i am not talking about governmental exploits and other highlevel crap)
And this is the point me and many others where trying to make.
Yesterday you did dodge most of the questions and made silly comments about all kinds of stuff, lets forget that and just go from here.
Get me the video and i will be impressed and you made your point (and i will stand correct if so) But if not then obviously you own us a BIG sorry, as we tried to explain you this.
How does that sound?
Cheeers
@Littlebits
Totally correct m8.