H
hjlbx
Thread author
IMPORTANT ! Some things you need to know about vulnerable processes:
JPCERT/CC Blog : Windows Commands Abused by Attackers
Most of the commands covered are actually executables that reside in either or both the System32 or SysWOW64 directories; just add .exe - for example, net command = net.exe and ipconfig command = ipconfig.exe.
JPCERT/CC Blog : Windows Commands Abused by Attackers
Most of the commands covered are actually executables that reside in either or both the System32 or SysWOW64 directories; just add .exe - for example, net command = net.exe and ipconfig command = ipconfig.exe.
Last edited by a moderator: