ChaosMonkey
@ChaosMonkey@lemmy.dbzer0.com
This is a remote user, information on this page may be incomplete. View at Source ↗
Software developer interested into security and sustainability.
- Comment on Windows User Account Control Bypassed Using Character Editor to Escalate Privileges 1 day ago:
Yes, by deault windows launches UAC prompts in the supposedly isolated “secure desktop” instead of the classicsl “interactive user desktop”
- Comment on Windows User Account Control Bypassed Using Character Editor to Escalate Privileges 2 days ago:
This I’d not necessary for the attack. It was used to illustrate the vulnerable app manifest configuration.
- Comment on [deleted] 1 month ago:
You could try to dump the EEPROM and get a hold of the user password or override it by reprogramming it.