Overview : Here we will be looking into the bypassing techniques , first understanding UAC
> User Account Control (UAC). This feature allows for any process to be run with low privileges independent of who runs it (either a regular user or an admin).
> From an attacker’s perspective, bypassing UAC is…