Using Office VBA Macro to exploit a vulnerable driver (zam64.sys) using DeviceIoControl, to get NTAUTHORITY\SYSTEM
TL;DR - Ring 0 using Office Doc}
Credit: @0xDISREL
https://disrel.com/posts/Ring0VBA-Getting-Ring0-Using-a-Goddamn-Word-Document/
#driver , #exploitation, #VBA
TL;DR - Ring 0 using Office Doc}
Credit: @0xDISREL
https://disrel.com/posts/Ring0VBA-Getting-Ring0-Using-a-Goddamn-Word-Document/
#driver , #exploitation, #VBA
VBA: having fun with macros, overwritten pointers & R/W/X memory
credit : @AdeptsOf0xCC
https://adepts.of0x.cc/vba-hijack-pointers-rwa/
#macro , #VBA , #shellcode
———
@islemolecule_source
credit : @AdeptsOf0xCC
https://adepts.of0x.cc/vba-hijack-pointers-rwa/
#macro , #VBA , #shellcode
———
@islemolecule_source