1. Compile the following code (change the hardcoded stuff, like "limiteduser", paths etc.)
2. Place a malicious dll as c:\\a\\aaa.dll.
3. Execute the compiled executable. The dll is loaded in the SYSTEM process.
https://improsec.com/blog/ibm-advisory-4-6
No comments:
Post a Comment