this post was submitted on 09 Aug 2025
96 points (98.0% liked)

cybersecurity

4978 readers
20 users here now

An umbrella community for all things cybersecurity / infosec. News, research, questions, are all welcome!

Community Rules

Enjoy!

founded 2 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
[–] PleaseLetMeOut@lemmy.dbzer0.com 10 points 1 month ago (2 children)

TIL that ResHacking a manifest is "sophisticated" lol

[–] ChaosMonkey@lemmy.dbzer0.com 6 points 1 month ago* (last edited 1 month ago) (1 children)

It is not necessary for the attack and was used to illustrate the vulnerable app manifest configuration.

[–] PleaseLetMeOut@lemmy.dbzer0.com 2 points 1 month ago (1 children)

Oh, I assumed they edited the manifest to enable the flags. Nvm then.

[–] shalafi@lemmy.world 2 points 1 month ago

I thought so as well.

[–] 9point6@lemmy.world 4 points 1 month ago

They don't edit the manifest at all?