My in-progress 8.1 jailbreak hack doesn't require the Windows Kits Policy to be installed, no. It bootstraps execution of unsigned native code using an exploit in PowerShell, then loads a kernel driver using a flaw in the code signing system.
The PowerShell exploit is, in effect, a sandbox escape. It does not require Administrator privilege, but all you get is native code execution at the same privilege as your user account.
The kernel driver loading bug requires Administrator privilege; it is not bypassing the requirement of your account needing Administrator privilege to ask the Service Control Manager to load a driver on your behalf. In Raymond Chen terms, it's "already on the other side of the airtight hatchway".
The hack is designed to be automatically started and permanent; once installed, it'll load at each boot, until you uninstall it. It won't load if Safe Mode is enabled, to aid with troubleshooting. When it loads, it will write to the Security audit log to indicate that it has jailbroken the system. Also, I plan on enabling the desktop watermark as if a prerelease build and changing the text to "Jailbroken" or similar.
Melissa
Denver

Linear Mode