cm0002@lemmy.world to cybersecurity@infosec.pub · 4 months agoWindows User Account Control Bypassed Using Character Editor to Escalate Privilegescybersecuritynews.comexternal-linkmessage-square17fedilinkarrow-up11
arrow-up11external-linkWindows User Account Control Bypassed Using Character Editor to Escalate Privilegescybersecuritynews.comcm0002@lemmy.world to cybersecurity@infosec.pub · 4 months agomessage-square17fedilink
minus-squareTrapped In America@lemmy.dbzer0.comlinkfedilinkarrow-up0·4 months agoTIL that ResHacking a manifest is “sophisticated” lol
minus-square9point6@lemmy.worldlinkfedilinkarrow-up0·4 months agoThey don’t edit the manifest at all?
minus-squareChaosMonkey@lemmy.dbzer0.comlinkfedilinkarrow-up0·edit-24 months agoIt is not necessary for the attack and was used to illustrate the vulnerable app manifest configuration.
minus-squareTrapped In America@lemmy.dbzer0.comlinkfedilinkarrow-up0·4 months agoOh, I assumed they edited the manifest to enable the flags. Nvm then.
TIL that ResHacking a manifest is “sophisticated” lol
They don’t edit the manifest at all?
It is not necessary for the attack and was used to illustrate the vulnerable app manifest configuration.
Oh, I assumed they edited the manifest to enable the flags. Nvm then.
I thought so as well.