Jump to content
  • entries
  • comments
  • views

Entries in this blog

Cloning a Code Signing certificate or how to reduce antivirus detections in 60 seconds

Code signing is an important security mechanism that allows users to establish trust in the application they are about to run. For security purposes, developers must use code signing certificates to confirm that the application is legitimate and has not been modified by intruders. How does a code signing certificate get cloned? To understand how this attack works, you need to understand how the code signing process works. When signing code, a key pair (public and private key) is used t

Unsigned driver loading techniques using a signed vulnerable driver

Every time you try to install an unsigned driver on your Windows operating system, you get a warning that it is not recommended and may be dangerous to your computer. But what if I told you that there is a way to load an unsigned driver without these warnings?  First, you need to understand why Windows requires signed drivers. This is to keep your system safe and to protect you from potentially malicious programs that could damage or infect your computer. Unfortunately, it also restricts us

How EAC detects cheat windows through EnumWindows and how to bypass this

EAC (Easy Anti-Cheat) is software used to protect online games from cheaters. One of its functions is to detect processes and windows related to cheats. In this article, we will look at how EAC uses the EnumWindows feature to detect cheat windows. The EnumWindows function is part of the Windows API library and is used to list all windows on the system. When EAC starts up, it starts enumerating all the top windows on the system using this function. However, EAC does not just enumerate all wi
  • Create New...