Recommended Posts

I remember when I made a batch file that let you create new admin accounts with passwords attached. I swear I wasn't going to use it at school. :devil:

cool.

although its only your 2nd post...and i have no av installed right now :shiftyninja:

For this reason, I'm afraid I won't be testing it out. ;) Nice job though.

Link to comment
https://www.neowin.net/forum/topic/643376-make-admin-exe/#findComment-589484155
Share on other sites

cool.

although its only your 2nd post...and i have no av installed right now :shiftyninja:

AntiViruses don't always help. You can't depend on the result of an AV to decide whether a file is malicious or not. If he can make an exe, he can easily make it to delete all your files or worse, encrypt them and hold them for ransom, and no AV will stop it.

My point is, instead of relying on AVs, you can

a) Prevent/monitor it's access to the net with a firewall

b) Run it in a sandbox or a virtual machine

c) In a controlled environment, monitor it with Process Monitor to observe it's behavior

d) Advanced users can of course OllyDbg it :)

At the least, suspicious files should be run in a limited user account or a guest account.

Link to comment
https://www.neowin.net/forum/topic/643376-make-admin-exe/#findComment-589484215
Share on other sites

It embeds following manifest to exe file(s) by using Microsoft's mt.exe.

<?xml version="1.0" encoding="utf-8" ?>

<assembly xmlns="urn:schemas-microsoft-com:asm.v1" manifestVersion="1.0" >

<assemblyIdentity version="1.0.0.0"

processorArchitecture="X86"

name="??Exename"

type="win32" />

<trustInfo xmlns="urn:schemas-microsoft-com:asm.v3">

<security>

<requestedPrivileges>

<requestedExecutionLevel level="requireAdministrator" />

</requestedPrivileges>

</security>

</trustInfo>

</assembly>

Link to comment
https://www.neowin.net/forum/topic/643376-make-admin-exe/#findComment-589484798
Share on other sites

This topic is now closed to further replies.
  • Recently Browsing   0 members

    • No registered users viewing this page.