From a52b619a949ff7ae739553ff7b1417e4af0d4ce0 Mon Sep 17 00:00:00 2001 From: Soumyadeep Basu <42107347+sbasu7241@users.noreply.github.com> Date: Sun, 30 Jan 2022 14:37:41 +0530 Subject: [PATCH] Update README.md --- README.md | 4 ++++ 1 file changed, 4 insertions(+) diff --git a/README.md b/README.md index 106dd9c..e61c385 100644 --- a/README.md +++ b/README.md @@ -12,8 +12,12 @@ In this technique, we first steal the token from the WinLogon service, and escal The following is the diagram of the attack flow. (Source: Original Blogpost). +![](flow.png) + Apart from the original functionality, we have also added the Enable Debug Privilege feature, which sets the debug privilege too. +![](usage.png) + ### References - https://www.securityartwork.es/2021/09/27/trustedinstaller-parando-windows-defender/