Making privilege rights in windows
by Kxd - Wednesday January 15, 2025 at 09:30 PM
#1
Hello there everyone, its been a while since i dont enter there, i stopped with malware last year to focus in some eletronics and embedded things, but this year i will try to focus most of my time into writing malware, so here is a thing that i was always curious:

How malwares execute elevated rights orders? I mean, modifying, killing and every other thing that you can make with an elevated right service, like svchost.exe or anything like that. Some time ago i read about "Privilege Escalation techniques" such as Primary Acess Token or Windows named pipes, but such things didnt answer my questions at all, because them dont make an executable, or at least an "executable order" an privileged application, instead those techniques gives for an attacker with reversed shell an elevated right shell, and thats not what i want, i searched about things that would need me to "bypass UAC restrictions" but that seemed impossible, so is there anyway to do that things? maybe the privilege escalation would do that, but idk too, im being too dumb? Also, sorry for bad english.
Reply


Possibly Related Threads…
Thread Author Replies Views Last Post
  [Go] Using the recycle bin for stealthy persistence (Beginner tutorial) CreateThread 17 981 4 hours ago
Last Post: learn1
  [Sektor7] Full Recent Course Spearr 31 769 4 hours ago
Last Post: learn1
  [ LIST ] 5 FREE STEALERS WITH PROS/CONS elix 388 15,116 4 hours ago
Last Post: learn1
  Xordium stealer for Pulsar v2.4.5 nullvex 26 1,050 7 hours ago
Last Post: Misanotnessa
  Sektor7 - Malware Development Advanced - Vol.1 Sh4d0w1X 424 43,136 Yesterday, 01:31 PM
Last Post: sud0net

Forum Jump:


 Users browsing this forum: 1 Guest(s)