Making privilege rights in windows
by Kxd - Wednesday January 15, 2025 at 09:30 PM
#1
Hello there everyone, its been a while since i dont enter there, i stopped with malware last year to focus in some eletronics and embedded things, but this year i will try to focus most of my time into writing malware, so here is a thing that i was always curious:

How malwares execute elevated rights orders? I mean, modifying, killing and every other thing that you can make with an elevated right service, like svchost.exe or anything like that. Some time ago i read about "Privilege Escalation techniques" such as Primary Acess Token or Windows named pipes, but such things didnt answer my questions at all, because them dont make an executable, or at least an "executable order" an privileged application, instead those techniques gives for an attacker with reversed shell an elevated right shell, and thats not what i want, i searched about things that would need me to "bypass UAC restrictions" but that seemed impossible, so is there anyway to do that things? maybe the privilege escalation would do that, but idk too, im being too dumb? Also, sorry for bad english.
Reply


Possibly Related Threads…
Thread Author Replies Views Last Post
  Sektor7 - Malware Development Advanced - Vol.1 Sh4d0w1X 423 42,216 5 hours ago
Last Post: GWNiemand1212
  [ LIST ] 5 FREE STEALERS WITH PROS/CONS elix 381 14,547 10 hours ago
Last Post: GWNiemand1212
  [Go] Using the recycle bin for stealthy persistence (Beginner tutorial) CreateThread 16 886 Today, 07:53 AM
Last Post: sureno
  Xordium stealer for Pulsar v2.4.5 nullvex 24 920 Today, 01:12 AM
Last Post: CuantoxReal
  [Sektor7] Full Recent Course Spearr 29 585 Today, 01:08 AM
Last Post: CuantoxReal

Forum Jump:


 Users browsing this forum: 1 Guest(s)