악성코드분석소

  • 홈
  • 태그
  • 방명록

ETC

How to privilege escalation from admin to system

wsoh9812 2022. 6. 8. 12:37

https://github.com/veath1/StopDefender

 

GitHub - veath1/StopDefender: Stop Windows Defender programmatically

Stop Windows Defender programmatically. Contribute to veath1/StopDefender development by creating an account on GitHub.

github.com

 

 

https://github.com/veath1/ATS/blob/master/dllmain.cpp

 

GitHub - veath1/ATS

Contribute to veath1/ATS development by creating an account on GitHub.

github.com

 

'ETC' 카테고리의 다른 글

Windbg 명령어  (0) 2022.06.17
McAfee arbitrary file write Elevation of Privilege (CVE-2019-3582)  (0) 2022.06.13
Kernel Memory Read/Write Primitive using NalDrv.sys  (0) 2022.05.17
WINAPI 정리  (0) 2022.05.11
Code execution with de-serialization (leads to UAC bypass)  (0) 2022.05.09

'ETC'의 다른글

  • 현재글How to privilege escalation from admin to system

관련글

  • Windbg 명령어 2022.06.17
  • McAfee arbitrary file write Elevation of Privilege (CVE-2019-3582) 2022.06.13
  • Kernel Memory Read/Write Primitive using NalDrv.sys 2022.05.17
  • WINAPI 정리 2022.05.11
댓글
프로필사진

  • 분류 전체보기 (51)
    • Malware (14)
    • WindowsDriver (5)
    • ETC (21)
    • analysis TIP (2)
    • CTF (5)

Tag

uac bypass, hfiref0x, Driver Signature Enforcement, lazarus, windbg명령어, 필터드라이버, 악성코드 분석, uac-bypass, LAZARUS MALWARE, NalDrv.sys, uacbypass, Kernel Driver, 윈도우 드라이버, 악성코드 분석보고서, DLL Hijacking, 악성코드, Atombombing, privilege escalation, DSE, DLL 하이재킹,

최근글과 인기글

  • 최근글
  • 인기글

최근댓글

공지사항

페이스북 트위터 플러그인

  • Facebook
  • Twitter

Archives

Calendar

«   2025/06   »
일 월 화 수 목 금 토
1 2 3 4 5 6 7
8 9 10 11 12 13 14
15 16 17 18 19 20 21
22 23 24 25 26 27 28
29 30

방문자수Total

  • Today :
  • Yesterday :

Copyright © Kakao Corp. All rights reserved.

티스토리툴바