Operating Systems

Whether you use a cell-phone, a smart phone, a PC, laptop, server or a device like a router or a video camera, you are handling a machine that is controlled by an Operating System.
Hardening the system, using personal protection softwares and local firewalls are among the subjects posted here.

The last articles

MSDT DLL Hijack UAC bypass
Published on 2 February 2022
by Emeric Nasi

Note: This post requires some basic knowledge about Windows security and SysInternals toolsuit.

License : Copyright Emeric Nasi, some rights reserved

This work is licensed under a Creative Commons Attribution 4.0 International License.

1. Introduction

At the end of my talk at (...)

Hide HTA window for RedTeam
Published on 15 July 2021
by Emeric Nasi

License : Copyright Emeric Nasi (@EmericNasi), some rights reserved

This work is licensed under a Creative Commons Attribution 4.0 International License.

About

I wrote this short post to explain how to create a stealthy HTA file that launches without any window or taskbar mention. (...)

Code Injection - Weaponize GhostWriting Injection
Published on 2 September 2020
by Emeric Nasi

Prerequisites: This document requires some knowledge about Windows system programming. Also, it is mandatory to be familiar with concepts presented in Code injection series part 1.

License : Copyright Emeric Nasi (@EmericNasi), some rights reserved

This work is licensed under a Creative (...)

Code Injection - Disable Dynamic Code Mitigation (ACG)
Published on 1 December 2019
by Emeric Nasi

Prerequisites: This document requires some knowledge about Windows system programming. Also, it is mandatory to be familiar with concepts presented in Code injection series part 1 and 2.

License : Copyright Emeric Nasi (@EmericNasi), some rights reserved

This work is licensed under a (...)

Code Injection - Exploit WNF callback
Published on 1 December 2019
by Emeric Nasi

Prerequisites: This document requires some knowledge about Windows system programming. Also, it is mandatory to be familiar with concepts presented in Code injection series part 1.

License : Copyright Emeric Nasi (@EmericNasi), some rights reserved

This work is licensed under a Creative (...)