Removed MD files, we only use the webportal from now on. All MD files moved to archive

This commit is contained in:
Oddvar Moe
2018-10-25 18:31:11 +02:00
parent d6fe95fe98
commit 550263cd1e
138 changed files with 4 additions and 506 deletions

View File

@@ -0,0 +1,22 @@
## Xwizard.exe
* Functions: DLL hijack, Execute
```
xwizard.exe
Xwizard.exe will load a .DLL file located in the same directory (DLL Hijack) named xwizards.dll.
xwizard RunWizard {00000001-0000-0000-0000-0000FEEDACDC}
Xwizard.exe running a custom class that has been added to the registry.
```
* Resources:
* http://www.hexacorn.com/blog/2017/07/31/the-wizard-of-x-oppa-plugx-style/
* https://www.youtube.com/watch?v=LwDHX7DVHWU
* https://gist.github.com/NickTyrer/0598b60112eaafe6d07789f7964290d5
* Full path:
* c:\windows\system32\xwizard.exe
* c:\windows\sysWOW32\xwizard.exe
* Notes: Thanks to Adam - @Hexacorn, Nick Tyrer - @nicktyrer