How to break Windows
This is a discussion about How to break Windows in the Everything Windows category; Too bad the download doesn't work :(
This topic was started by EvilSECTOID, . Last reply by burzmali,
i found this cool site exploiting design flaws in windows
http://security.tombom.co.uk/shatter.html
do you know of any other fun exploits?
http://security.tombom.co.uk/shatter.html
do you know of any other fun exploits?
Participate in our website and join the conversation
This subject has been archived. New comments and votes cannot be submitted.
Responses to this topic
hey guest,
this isn't a virus, this is a 'local root exploit' for windows. There are many situations where multiple users all need to use the same computer. Those users can use this exploit to 'root' the machine and gain elevated privaliges, perhaps setting up new admin accounts or eraseing records or punching other holes in security. also, i believe you may also be able to use this exploit over windows virtual terminal server, where you log into a remote machine and it's desktop is in a window on your current desktop. XP pro comes with virtual terminal server enabled by default (called 'desktop sharing' or something). so, there are many times and places where you have to have untrusted users physically log into a machine, and those users will be able to use this exploit to 'root' you.
this isn't a virus, this is a 'local root exploit' for windows. There are many situations where multiple users all need to use the same computer. Those users can use this exploit to 'root' the machine and gain elevated privaliges, perhaps setting up new admin accounts or eraseing records or punching other holes in security. also, i believe you may also be able to use this exploit over windows virtual terminal server, where you log into a remote machine and it's desktop is in a window on your current desktop. XP pro comes with virtual terminal server enabled by default (called 'desktop sharing' or something). so, there are many times and places where you have to have untrusted users physically log into a machine, and those users will be able to use this exploit to 'root' you.