|
You are here |
ogmini.github.io | ||
| | | | |
adsecurity.org
|
|
| | | | | [AI summary] The article explains a method to bypass Windows logon security by replacing the Ease of Access Sticky Keys executable with a command prompt to gain system-level access. | |
| | | | |
www.khyrenz.com
|
|
| | | | | Let me start by saying that, yes: many tools already exist to parse information out of the Windows Registry and/or the Event Log. However, while I was conducting my own tool validation processes (see https://github.com/khyrenz/tool_validation), I realised that very few tools parse this information out and automatically populate the kind of table that I would be adding into my forensic report.So... I did a bit of R&D, and I present to you a Python script that does just that; creatively named pars | |
| | | | |
thinkdfir.com
|
|
| | | | | In preparation for an upcoming FOR500 class I thought I would test out one of the recent additions to the class. This post by my colleague Zach shows that Win10 1903 and later has a registry key that will store the full path of any executable that utilises the computers camera or microphone. Zach shows... | |
| | | | |
gnn.vircom.in
|
|
| | | [AI summary] A critical security vulnerability in Lenovo's preloaded Windows systems allows attackers to bypass AppLocker through a writable MFGSTAT.zip file using Alternate Data Streams. | ||