The post discusses how to abuse a Visual Studio build process to achieve remote code execution. It covers setting up a Gitea server, hosting a malicious project, and using pre-build commands to execute arbitrary code. The author also explores gaining a shell as a local service and escalating privileges to achieve system-level access.

27m read time From 0xdf.gitlab.io
Post cover image
Table of contents
Box InfoReconShell as enoxShell as local serviceShell as system
1 Comment

Sort: