Btw - it's also possible to use the Browse button under 'Log File Path' to launch cmd too
-
-
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
-
-
Turns out that good old dll hijacking can be used to have fun with odbcad32 from the cmdline/non gui https://secureyourit.co.uk/wp/2019/09/18/user-account-control-odbcad32-exe/ …
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
-
-
This is not a UAC bypass because the process is elevated and an attacker can therefore not interact with the UI (you would need to inject into osk.exe or similar processes). The same thing is with: start taskmgr and file->new task => elevated cmd.exe. this is also no UAC bypass
-
turns out dll hijacking is a viable option for non gui fun https://secureyourit.co.uk/wp/2019/09/18/user-account-control-odbcad32-exe/ …
Kraj razgovora
Novi razgovor -
-
-
Inspiration from the training?

-
Definitely


- Još 1 odgovor
Novi razgovor -
-
-
Haha noice
-
- Još 1 odgovor
Novi razgovor -
-
-
Obligatory "I can't see shit on this Twitter video" comment *you're welcome, internet. i'm here for you
-
Novi razgovor -
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.