A penetration tester has obtained shell access to a Windows host and wants to run a specially crafted binary for later execution using the ymic.exe process call create function. Which of the following OS or filesystem mechanisms is MOST likely to support this objective?
ryanzou
Highly Voted 2 years, 7 months agocy_analyst
Highly Voted 2 years, 1 month ago[Removed]
2 years, 1 month agokinny4000
2 months, 3 weeks agocy_analyst
2 years, 1 month agocy_analyst
2 years, 1 month agocy_analyst
2 years, 1 month agoKingIT_ENG
2 years, 1 month ago[Removed]
2 years, 1 month agokinny4000
Most Recent 2 months, 3 weeks agoEtc_Shadow28000
9 months, 3 weeks agoEtc_Shadow28000
9 months, 3 weeks agosurfuganda
1 year, 1 month agodeeden
1 year, 1 month agoYokota
1 year, 3 months agoPhillyCheese
1 year, 4 months agoPhillyCheese
1 year, 4 months agoCaoilfhion
1 year, 4 months agostephyfresh13
1 year, 4 months agopentesternoname
1 year, 5 months agosolutionz
1 year, 8 months ago[Removed]
2 years agoKingIT_ENG
2 years, 1 month agonickwen007
2 years, 1 month ago[Removed]
2 years, 1 month agocy_analyst
2 years, 1 month agokloug
2 years, 2 months ago[Removed]
2 years, 2 months ago[Removed]
2 years, 2 months ago