cm0002@lemmy.world to cybersecurity@infosec.pub · 8 days agoWindows User Account Control Bypassed Using Character Editor to Escalate Privilegescybersecuritynews.comexternal-linkmessage-square19fedilinkarrow-up196arrow-down12
arrow-up194arrow-down1external-linkWindows User Account Control Bypassed Using Character Editor to Escalate Privilegescybersecuritynews.comcm0002@lemmy.world to cybersecurity@infosec.pub · 8 days agomessage-square19fedilink
minus-squareTrapped In America@lemmy.dbzer0.comlinkfedilinkarrow-up12arrow-down2·8 days agoTIL that ResHacking a manifest is “sophisticated” lol
minus-squareChaosMonkey@lemmy.dbzer0.comlinkfedilinkarrow-up6·edit-28 days agoIt is not necessary for the attack and was used to illustrate the vulnerable app manifest configuration.
minus-squareTrapped In America@lemmy.dbzer0.comlinkfedilinkarrow-up2·8 days agoOh, I assumed they edited the manifest to enable the flags. Nvm then.
TIL that ResHacking a manifest is “sophisticated” lol
It is not necessary for the attack and was used to illustrate the vulnerable app manifest configuration.
Oh, I assumed they edited the manifest to enable the flags. Nvm then.
I thought so as well.
They don’t edit the manifest at all?