You guys are making this look easy. Whilst it’s most definitely not! Nice quick clean, straightforward and impressive approach!
-
-
Thanks. Twitter will use this to make your timeline better. UndoUndo
-
-
-
So you need to find a driver or something running in kernel mode, to exploit such vulnerabilities?
-
Never mind, you go in ring 0 to patch the access token of the current process and change the user sid just to read the flag with an elevated cmd. You're already in rdp in this game, understood.
End of conversation
New conversation -
-
-
Great write-up. I like the methodology ;) Quick'N'Dirty!
Thanks. Twitter will use this to make your timeline better. UndoUndo
-
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.