This script is adapted to perform a privilege escalation and a custom edition of the local DNS hosts
file on Windows machines, located in the C:\Windows\system32\drivers\etc\
directory.
- Changing the default's
Restricted
ExecutionPolicy toBypass
for theCurrentUser
Scope.