cm0002@lemmy.world to cybersecurity@infosec.pub · 3 days agoWindows User Account Control Bypassed Using Character Editor to Escalate Privilegescybersecuritynews.comexternal-linkmessage-square19linkfedilinkarrow-up198arrow-down12
arrow-up196arrow-down1external-linkWindows User Account Control Bypassed Using Character Editor to Escalate Privilegescybersecuritynews.comcm0002@lemmy.world to cybersecurity@infosec.pub · 3 days agomessage-square19linkfedilink
minus-squareTrapped In America@lemmy.dbzer0.comlinkfedilinkarrow-up12arrow-down2·3 days agoTIL that ResHacking a manifest is “sophisticated” lol
minus-squareChaosMonkey@lemmy.dbzer0.comlinkfedilinkarrow-up6·edit-23 days agoIt is not necessary for the attack and was used to illustrate the vulnerable app manifest configuration.
minus-squareTrapped In America@lemmy.dbzer0.comlinkfedilinkarrow-up2·3 days agoOh, I assumed they edited the manifest to enable the flags. Nvm then.
TIL that ResHacking a manifest is “sophisticated” lol
It is not necessary for the attack and was used to illustrate the vulnerable app manifest configuration.
Oh, I assumed they edited the manifest to enable the flags. Nvm then.
I thought so as well.
They don’t edit the manifest at all?