<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Zet on 🕵 1dnu11</title><link>https://1dnu11.github.io/zet/</link><description>Recent content in Zet on 🕵 1dnu11</description><generator>Hugo -- gohugo.io</generator><language>en-US</language><copyright>Copyright © 2024, 1dnu11.</copyright><lastBuildDate>Sat, 23 Mar 2024 00:00:00 +0000</lastBuildDate><atom:link href="https://1dnu11.github.io/zet/index.xml" rel="self" type="application/rss+xml"/><item><title>File System Vulnerability - Alternate Data Streams</title><link>https://1dnu11.github.io/zet/file-system-vulnerability-alternate-data-streams/</link><pubDate>Sat, 23 Mar 2024 00:00:00 +0000</pubDate><guid>https://1dnu11.github.io/zet/file-system-vulnerability-alternate-data-streams/</guid><description>Alternate Data Streams (ADS) NTFS (New Technology File System) is the default file system for Windows. Alternate Data Streams (ADS) is an NTFS file attribute designed to provide compatibility with MacOS HFS (Hierarchical File System).
Whenever we work with a file on an NTFS formatted drive, there will be two different forks/streams:
Data stream: Default stream that contains the actual data of the file Resource stream: Contains the metadata of the file ADS can then be abused to hide malicious code or executables in legitimate files, thus avoiding detection.</description></item><item><title>PrivEsc - Bypassing UAC with UACMe</title><link>https://1dnu11.github.io/zet/privesc-bypassing-uac-with-uacme/</link><pubDate>Fri, 22 Mar 2024 00:00:00 +0000</pubDate><guid>https://1dnu11.github.io/zet/privesc-bypassing-uac-with-uacme/</guid><description>UAC (User Account Control) UAC is a security feature introduced in Windows Vista. It is used to prevent changes to the operating system without the proper adminitrative approval. A non-privileged user attempting to execute a program with elevated privileges will be prompted with the UAC credential prompt, where a privileged user will just be prompted with a consent prompt.
It&amp;rsquo;s possible to bypass UAC in order to execute malicious executables with elevated privileges.</description></item><item><title>PrivEsc - Windows - Access Token Impersonation</title><link>https://1dnu11.github.io/zet/privesc-access-token-impersonation/</link><pubDate>Fri, 22 Mar 2024 00:00:00 +0000</pubDate><guid>https://1dnu11.github.io/zet/privesc-access-token-impersonation/</guid><description>Windows Access Tokens Created and managed by the *LSASS, access tokens are the core element of the authentication process on Windows. They are responsible for identifying and describing the security context of a process or thread. They can be seen as a temporary key that provides users with the required access to a system, without having to provide credentials each time a process is started or resources is used.
They are generated by the winlogon.</description></item></channel></rss>