cm0002@lemmy.world to cybersecurity@infosec.pub · 1 month agoWindows User Account Control Bypassed Using Character Editor to Escalate Privilegescybersecuritynews.comexternal-linkmessage-square19linkfedilinkarrow-up198arrow-down12
arrow-up196arrow-down1external-linkWindows User Account Control Bypassed Using Character Editor to Escalate Privilegescybersecuritynews.comcm0002@lemmy.world to cybersecurity@infosec.pub · 1 month agomessage-square19linkfedilink
minus-squareTrapped In America@lemmy.dbzer0.comlinkfedilinkarrow-up12arrow-down2·1 month agoTIL that ResHacking a manifest is “sophisticated” lol
minus-squareChaosMonkey@lemmy.dbzer0.comlinkfedilinkarrow-up6·edit-21 month agoIt is not necessary for the attack and was used to illustrate the vulnerable app manifest configuration.
minus-squareTrapped In America@lemmy.dbzer0.comlinkfedilinkarrow-up2·1 month agoOh, I assumed they edited the manifest to enable the flags. Nvm then.
TIL that ResHacking a manifest is “sophisticated” lol
It is not necessary for the attack and was used to illustrate the vulnerable app manifest configuration.
Oh, I assumed they edited the manifest to enable the flags. Nvm then.
I thought so as well.
They don’t edit the manifest at all?