UAC & Local Privilege Escalation
White hacking commonly involves reverse engineering in order to automate a process that is not easily accessible. Any application can be modified or intercepted to any extend. Even without bypassing security boundaries, you still have vast options of manipulation to ultimately improve automation, usability, accessibility or data extraction.
So much for horizontal privilege escalation in the business scope. The screenshots show my research on the user account control (UAC) and I have discovered several ways to bypass it and elevate privileges. Environment variables seemed particularly vulnerable to me, since there are various ways to inject them, leading to altered execution flow.
Source-code and binaries of 5 UAC exploits I discovered can be found on my project page. Please note, that I have educated Microsoft's security research team by sending a detailed whitepaper months before releasing them and to this date, they are not patched.