cm0002@lemmy.world to cybersecurity@infosec.pub · 6 months agoWindows User Account Control Bypassed Using Character Editor to Escalate Privilegescybersecuritynews.comexternal-linkmessage-square8linkfedilinkarrow-up168arrow-down11
arrow-up167arrow-down1external-linkWindows User Account Control Bypassed Using Character Editor to Escalate Privilegescybersecuritynews.comcm0002@lemmy.world to cybersecurity@infosec.pub · 6 months agomessage-square8linkfedilink
minus-squareTrapped In America@lemmy.dbzer0.comlinkfedilinkarrow-up10arrow-down2·6 months agoTIL that ResHacking a manifest is “sophisticated” lol
minus-squareChaosMonkey@lemmy.dbzer0.comlinkfedilinkarrow-up5·6 months agoIt is not necessary for the attack and was used to illustrate the vulnerable app manifest configuration.
minus-squareTrapped In America@lemmy.dbzer0.comlinkfedilinkarrow-up2·6 months agoOh, I assumed they edited the manifest to enable the flags. Nvm then.
minus-square9point6@lemmy.worldlinkfedilinkarrow-up4·6 months agoThey don’t edit the manifest at all?
TIL that ResHacking a manifest is “sophisticated” lol
It is not necessary for the attack and was used to illustrate the vulnerable app manifest configuration.
Oh, I assumed they edited the manifest to enable the flags. Nvm then.
I thought so as well.
They don’t edit the manifest at all?