Breaking computers

Father

Professional
Messages
2,602
Reaction score
850
Points
113
In this article, we will talk about recent network vulnerabilities that can harm you in one way or another.

Disk Corruption
This vulnerability can be made in two ways:
* create an internet shortcut with a link to the icon
* opening a path on the command line

Create a shortcut on the desktop, register an address.
After that, in the properties of the shortcut, click change icon.

In the selected line, specify the following line:
Code:
C:\:$i30:$bitmap
And click OK. After that, the system will try to open this path in the background, and an error will occur. You will need to perform a disk check after reboot (chkdsk)

You can also demonstrate this vulnerability via the command line.
Write this command and press Enter:
Code:
cd C:\:$i30:$bitmap

Personally, I got out of the bsod, and after that I needed to check the disk after a system reboot.
60yzedt433I.jpg

As practice has shown, this vulnerability is not fatal. After checking and restoring the disk, in most cases the system will work properly, just like the disks. But this does not exclude the possibility of damage to any fragments (MFT for example), and subsequently difficulties with starting the OS, etc.

Calling the "screen of death"
Insert the following in the address bar of any browser:
Code:
\\.\globalroot\device\condrv\kernelconnect
After that, click on it. Please note that "Google search" will not work here.

M8wPZXc6vV0.jpg

Well, that's all, after a split second we get the "screen of death", and we see what caused the problem, as well as the stop code itself:

Thank you all for your attention!
 
Top