#16
|
|||
|
|||
The scrub hands script is pretty neat, it sets the standard for wiping a operation device from incriminating evidence, so we know those methods work.
Last edited by H4vC; 04-17-2017 at 19:07. |
#17
|
|||
|
|||
But the real question is who is Fred?
Code:
# # MAP FRED'S SHARE # my $fredIP; my $fredPW; Code:
$temp = system ("cmd.exe /c \"net use Y: \\\\$fredIP\\downshare /USER:fred /PERSISTENT:NO\""); |
#18
|
|||
|
|||
Added a table to the first post on this thread showing the EXPLOITS and the OS-es (and their versions) that they are effective against.
Of course, this is if the patches have not been already applied to the OS-es ! |
The Following User Says Thank You to TechLord For This Useful Post: | ||
cjack (04-18-2017) |
#19
|
|||
|
|||
Thanks!
it's many things to discover and use from this leak i don't expect an youtube channel nor a book about all that,but would be funny,they don't included a complete documentation
__________________
I like this forum! |
#20
|
|||
|
|||
Find it really interesting that MS put out a patch to fix most of these a month before they were "leaked".
|
#21
|
|||
|
|||
Good stuff! One can learn interesting things from this.
|
|
|
Similar Threads | ||||
Thread | Thread Starter | Forum | Replies | Last Post |
Can the VFP Compiler be decrypted? | giv | General Discussion | 8 | 05-05-2011 14:17 |