Get the latest tech news
I ruined my vacation by reverse engineering WSC
In this post I will briefly describe the journey I went through while implementing defendnot. Even though this is most likely not what you expected to see here, but rather than going into full technical details on how everything works, I will describe what rabbitholes I went through and how painful everything was due to my ✨special✨ environment.
Essentially, WSC service is just a dll that is being run by svchost, the only thing that blocks us from attaching debugger to it right ahead is the PPL protection, which very conveniently can be removed with a few lines of code in kernel mode. At that time my friend has already woken up and had to do some stuff for the uni on their PC, so I connected directly to the vm using Parsec and my setup immediately got even worse because on top of the latency issues, now the encoding was being done in software which was super slow. Pindos for heating up their room by the pc running at night so that I can debug the WSC service MrBruh for poking me into researching this and listening to my mad ideas while I was working on this Everyone else i was texting during these few days I love you kimchi The graffiti artist that VANDALIZED our wall
Or read this on Hacker News