A penetration tester has obtained shell access to a Windows host and wants to run a specially crafted binary for later execution using the ymic.exe process call create function. Which of the following OS or filesystem mechanisms is MOST likely to support this objective?
ryanzou
Highly Voted 2 years, 9 months agocy_analyst
Highly Voted 2 years, 3 months ago[Removed]
2 years, 3 months agokinny4000
4 months, 3 weeks agocy_analyst
2 years, 3 months agocy_analyst
2 years, 3 months agocy_analyst
2 years, 3 months agoKingIT_ENG
2 years, 3 months ago[Removed]
2 years, 3 months agokinny4000
Most Recent 4 months, 3 weeks agoEtc_Shadow28000
11 months, 3 weeks agoEtc_Shadow28000
11 months, 3 weeks agosurfuganda
1 year, 3 months agodeeden
1 year, 3 months agoYokota
1 year, 5 months agoPhillyCheese
1 year, 6 months agoPhillyCheese
1 year, 6 months agoCaoilfhion
1 year, 6 months agostephyfresh13
1 year, 6 months agopentesternoname
1 year, 7 months agosolutionz
1 year, 10 months ago[Removed]
2 years, 2 months agoKingIT_ENG
2 years, 3 months agonickwen007
2 years, 3 months ago[Removed]
2 years, 3 months agocy_analyst
2 years, 3 months agokloug
2 years, 4 months ago[Removed]
2 years, 4 months ago[Removed]
2 years, 4 months ago