Explore >> Select a destination


You are here

blog.acrossecurity.com
| | blog.0patch.com
4.3 parsecs away

Travel
| | by Mitja Kolsek, the 0patch Team Security researcher Oliver Lyak published a detailed analysis of a local privilege escalation vulnerabil...
| | blog.0patch.com
4.5 parsecs away

Travel
| | by Mitja Kolsek, the 0patch Team On April 21, security researcher Adrian Denkiewicz published an in-depth analysis of a local privilege...
| | macrosec.tech
3.8 parsecs away

Travel
| | The first thing we need to do is to identify which dll is crucial for discord to run because that is the dll we will use to perform dll hijacking. In order to find out, we need to open the file location of discord and we see: To identify the COM Keys of Chrome that we can use for COM Hijacking, we use the tool Process Monitor to identify all the processes running when Chrome runs, we also discover the COM servers that are missing CLSID's and the ones which don't require elevated privileges. We use the following filters:
| | jrhawley.ca
26.4 parsecs away

Travel
| Rust is rapidly becoming a powerful and popular programming language. Running it on Windows can be a bit of a pain, so here's a guide to make it easier.