From c27f109d1cdc7f6d69c867417f48e85dd2907daf Mon Sep 17 00:00:00 2001 From: CPol Date: Sat, 23 Jan 2021 15:58:02 +0000 Subject: [PATCH] GitBook: [master] 2 pages modified --- windows/windows-local-privilege-escalation/README.md | 2 +- windows/windows-local-privilege-escalation/msi-wrapper.md | 3 ++- 2 files changed, 3 insertions(+), 2 deletions(-) diff --git a/windows/windows-local-privilege-escalation/README.md b/windows/windows-local-privilege-escalation/README.md index 8106bc7a..b3d87dbe 100644 --- a/windows/windows-local-privilege-escalation/README.md +++ b/windows/windows-local-privilege-escalation/README.md @@ -223,7 +223,7 @@ Just execute the created binary to escalate privileges. ### MSI Wrapper -Read this tutorial to learn how to create a MSI wrapper using this tools: +Read this tutorial to learn how to create a MSI wrapper using this tools. Note that you can wrap a "**.bat**" file if you **just** want to **execute** **command lines** {% page-ref page="msi-wrapper.md" %} diff --git a/windows/windows-local-privilege-escalation/msi-wrapper.md b/windows/windows-local-privilege-escalation/msi-wrapper.md index b3c73514..e58ff76a 100644 --- a/windows/windows-local-privilege-escalation/msi-wrapper.md +++ b/windows/windows-local-privilege-escalation/msi-wrapper.md @@ -1,6 +1,7 @@ # MSI Wrapper -Download the free version app from [https://www.exemsi.com/documentation/getting-started/](https://www.exemsi.com/download/), execute it and wrap the "malicious" binary on it: +Download the free version app from [https://www.exemsi.com/documentation/getting-started/](https://www.exemsi.com/download/), execute it and wrap the "malicious" binary on it. +Note that you can wrap a "**.bat**" if you **just** want to **execute** **command lines \(instead of cmd.exe select the .bat file\)** ![](../../.gitbook/assets/image%20%2848%29.png)