Jump to content

Search the Community

Showing results for tags 'smss.exe'.



More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • The Box
    • Building, Troubleshooting & Modding
    • Processors, Motherboards & Memory
    • Overclocking & Cooling
    • Audio & Display
    • Storage, Networking & Security
    • Portable & Mobile Tech
  • The Tools
    • Gaming
    • Windows
    • Unix, Linux & Open Source Software
    • Apple
    • Design & Coding
    • Photography & Video
  • The Content
  • The Geeks
    • Tech Talk
    • The Green Room
    • Feedback
    • Community Events
  • Atomic Board Gamers's General Board Games Chat

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


AIM


MSN


Website URL


ICQ


Yahoo


Jabber


Skype


Location


Interests

Found 1 result

  1. Hey guys so I'm messing around with a copy of Windows 7, Metasploit, and the python programming language. I've noticed that even after I've got NT/AUTHORITY access on a machine, there are still certain things that I cant do. After doing some research I found out that even with superuser access, I may not be in the correct "privilege ring" to accomplish what I want, ie forcing the computer to stop system critical programs, delete certain files, etc. So my thought here is, knowing that the smss.exe process is responsible for starting the kernel and user modes and loads the registry, what if I created a registry key that lets me interact with a custom python script. Would it inherit the same privs/rights as smss.exe? Does anyone have any thoughts or recommendations? BTW, I know that me wanting to delete or stop system critical files is ridiculous. As stated above, this is all in a VM on my PC and is all proof of concept and me goofing off.
×