I wrote about #HiveNightmare aka #SeriousSAM (blame @cyb3rops for that one), an unpatched Windows 10 vulnerability that allows any non-admin user to access the full system registry, including sensitive areas.
Terribly badly coded PoC included.https://doublepulsar.com/hivenightmare-aka-serioussam-anybody-can-read-the-registry-in-windows-10-7a871c465fa5 …
-
-
-
What is that tool you are using?
End of conversation
New conversation -
-
-
Presumably the AV/IDS FS filter would only get the final path for the file? Then again, this is AV we're talking about, so maybe they just hook NtCreateFile :D
-
Also wonder what happens if you open by ID?
End of conversation
New conversation -
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.