Unlike traditional attacks that rely on exploits, this succeeds through social engineering combined with abuse of Windows' ...