Commit message (Collapse) | Author | Age | Files | Lines | |
---|---|---|---|---|---|
* | attacksurface: update to wintun changes | 2019-09-23 | 1 | -1/+1 | |
| | |||||
* | attacksurface: mention named pipe escape hatch | 2019-09-05 | 1 | -1/+1 | |
| | |||||
* | attacksurface: update mention of prefixes and namespaces | 2019-08-31 | 1 | -1/+2 | |
| | |||||
* | tunnel: retain SeLoadDriverPrivilege | 2019-06-07 | 1 | -1/+1 | |
| | | | | This is a big loss. We'll need to revisit this. | ||||
* | global: several helpers are now upstream | 2019-05-27 | 1 | -1/+1 | |
| | |||||
* | ui: drop permissions | 2019-05-15 | 1 | -0/+1 | |
| | |||||
* | service: move WTS upstream | 2019-05-15 | 1 | -1/+1 | |
| | |||||
* | service: clean up token mangling | 2019-05-14 | 1 | -1/+1 | |
| | |||||
* | attacksurface: updates | 2019-05-13 | 1 | -5/+4 | |
| | |||||
* | service: use more standard naming scheme for syscalls | 2019-05-13 | 1 | -1/+1 | |
| | |||||
* | service: run UI with elevated token | 2019-05-12 | 1 | -6/+4 | |
| | | | | | There are too many attacks possible when starting this with a non-elevated token. | ||||
* | service: run UI at high integrity | 2019-05-11 | 1 | -0/+1 | |
| | |||||
* | service: local system's token is a bit more locked down than elevated | 2019-05-08 | 1 | -4/+4 | |
| | |||||
* | attacksurface: update with latest info | 2019-05-07 | 1 | -10/+2 | |
| | |||||
* | updater: move into manager | 2019-05-06 | 1 | -1/+1 | |
| | |||||
* | service: set security attributes on new process | 2019-05-02 | 1 | -1/+3 | |
| | |||||
* | version: add certificate checking for official versions | 2019-04-30 | 1 | -1/+1 | |
| | | | | This is an easy circumventable check designed mostly for convenience. | ||||
* | version: add beginnings of authenticode checking | 2019-04-30 | 1 | -0/+11 | |
| | |||||
* | service: use WireGuardTunnel$ prefix | 2019-04-05 | 1 | -1/+1 | |
| | |||||
* | attacksurface: add descriptions | 2019-04-02 | 1 | -0/+40 | |