|
You are here |
enigma0x3.net | ||
| | | | |
pentestlab.blog
|
|
| | | | | The accessibility features provide additional options (on screen keyboards, magnifier, screen reading etc.) that could assist people with disabilities to use Windows operating systems easier. However, this functionality can be abused to achieve persistence on a host that RDP is enabled and Administrator level privileges have been obtained. This technique touches the disk, or modification... | |
| | | | |
www.geekrant.org
|
|
| | | | | ||
| | | | |
bohops.com
|
|
| | | | | Introduction Last week, I presented COM Under The Radar: Circumventing Application Control Solutions at BsidesCharm 2019. In the presentation, I briefly discussed COM and highlighted a few techniques for bypassing Windows application control solutions. One of those techniques takes advantage of an issue with catalog hygiene where old code often remains signed in updated versions... | |
| | | | |
blog.waynesheffield.com
|
|
| | | Of the many enhancement requests for SQL Server, my #1 request is to have it track when objects and columns were last used. | ||