If you ask nice maybe I drop how to make an .exe file that deletes it self while running and continues running after deletion.
-
This Tweet is unavailable.
-
-
This Tweet is unavailable.
-
Not yet, but someone knows a place where the assumption of a running file mapping to its matching file on disk have security consequences. Maybe something like antivirus, drm, anti cheating, authenticode.... I dont wanna drop stuff that directly could damage stuff.
1 reply 0 retweets 0 likes -
Replying to @jonasLyk @SandboxBear
And one of the next days new methods for Local Service -> SYSTEM will get dropped so...... thats all
1 reply 0 retweets 0 likes -
This Tweet is unavailable.
-
I started only 6 months ago, if you have dedication enough its doable
1 reply 0 retweets 1 like -
Replying to @jonasLyk @SandboxBear
Someone asked me 2 weeks ago for helt getting started. I gave ham links, tools, some advice and told him where there is a vuln in nvidia driver. He have already made 2 EOP exploit- the other was in dropbox client. It is not rocket surgery
0 replies 0 retweets 0 likes -
This Tweet is unavailable.
-
sure- https://www.youtube.com/watch?v=Y1YJCKfvJEM … https://www.youtube.com/watch?v=0KO3oGXtMNo … https://github.com/googleprojectzero/symboliclink-testing-tools … http://www.zezula.net/en/fstools/filetest.html … and procmon your initial goal should be to either create writeable file in system32 create writeable dir in system32
3 replies 0 retweets 1 like
for targets
start procmon
higlight everything running with system integrity
ingore registry and network entries
run forfiles /m *.msi /P C:\windows\installer /C "cmd /c msiexec /qn /i @file"
there is decent chance for finding exploitable conditions there- i found one last week
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.