LSF - Windows Exploit #1676
Unanswered
2pro12342
asked this question in
Help [JOIN TITANIUM NETWORK TO SHARE PLEASE]
Replies: 2 comments
-
|
🧌 |
Beta Was this translation helpful? Give feedback.
0 replies
-
|
🐳 |
Beta Was this translation helpful? Give feedback.
0 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Uh oh!
There was an error while loading. Please reload this page.
-
I recently found an exploit like LTMEAT. It works the same but it doesn't use "chrome-extension://EXTID/Manifest.json". Most of chrome urls and chrome ext urls are blocked. But since I'm on a Windows laptop that uses the LightSpeed Admin Apps, I can access the Manifest file. I was originally going to call it LSF (Light-Speed Freezer), but I like W1n-Freez3r better. There is a problem; If I use the name LSF, that means that it is only for LightSpeed. Founds out that I also got the LightSpeed Classroom File.
Part 1: INSTRUCTIONS to Get Blocker File
1: Open the WINDOWS Task Manager (Not Chrome).
2: Find the Blocker Running.
3: Right Click on it and click on "Open File Location".
4: Look for the "manifest.json" file.
5: Click on it then Right Click it.
6: Click "Copy File Path" then paste it in a new tab. (Make sure to remove the quotation marks from the link)
7: Press Enter.
Part 2: Freeze The Admin Blocker App
I do not have any way to freeze the app. ChatGPT says the only way to freeze the Admin Blocker App is to use an app from python (because HTML/Data URLs cannot Access the user's File System) or by removing the File Manually (Which isn't possible due to Admin Policy/Admin Lock). I've already tried using Blob URLs, Iframes/Pop-ups, and Chrome Debugging URLs.
This Project will be discontinued because I can't find how to freeze the file. Anybody can continue my project.
Credits: LTMEAT, LTBEEF, @Blobby-Boi, Ext Remover, and the creator of Dextensify.
Beta Was this translation helpful? Give feedback.
All reactions