Father
Professional
- Messages
- 2,602
- Reaction score
- 850
- Points
- 113
In this article, we will talk about recent network vulnerabilities that can harm you in one way or another.
Disk Corruption
This vulnerability can be made in two ways:
* create an internet shortcut with a link to the icon
* opening a path on the command line
Create a shortcut on the desktop, register an address.
After that, in the properties of the shortcut, click change icon.
In the selected line, specify the following line:
And click OK. After that, the system will try to open this path in the background, and an error will occur. You will need to perform a disk check after reboot (chkdsk)
You can also demonstrate this vulnerability via the command line.
Write this command and press Enter:
Personally, I got out of the bsod, and after that I needed to check the disk after a system reboot.
As practice has shown, this vulnerability is not fatal. After checking and restoring the disk, in most cases the system will work properly, just like the disks. But this does not exclude the possibility of damage to any fragments (MFT for example), and subsequently difficulties with starting the OS, etc.
Calling the "screen of death"
Insert the following in the address bar of any browser:
After that, click on it. Please note that "Google search" will not work here.
Well, that's all, after a split second we get the "screen of death", and we see what caused the problem, as well as the stop code itself:
Thank you all for your attention!
Disk Corruption
This vulnerability can be made in two ways:
* create an internet shortcut with a link to the icon
* opening a path on the command line
Create a shortcut on the desktop, register an address.
After that, in the properties of the shortcut, click change icon.
In the selected line, specify the following line:
Code:
C:\:$i30:$bitmap
You can also demonstrate this vulnerability via the command line.
Write this command and press Enter:
Code:
cd C:\:$i30:$bitmap
Personally, I got out of the bsod, and after that I needed to check the disk after a system reboot.
As practice has shown, this vulnerability is not fatal. After checking and restoring the disk, in most cases the system will work properly, just like the disks. But this does not exclude the possibility of damage to any fragments (MFT for example), and subsequently difficulties with starting the OS, etc.
Calling the "screen of death"
Insert the following in the address bar of any browser:
Code:
\\.\globalroot\device\condrv\kernelconnect
Well, that's all, after a split second we get the "screen of death", and we see what caused the problem, as well as the stop code itself:
Thank you all for your attention!