LTVegan - disable forced admin-installed extensions on the latest version of ChromeOS
Original LTMEAT method found by Bypassi#7037.
LTVegan method found by Ashton Davies.
An alternative method of the LTMEAT exploit based on Alternate Method #1 found by Bypassi(Bypassi#7037) that hangs and refreshes admin-installed extensions from any webpage. This version of the original LTMEAT exploit is also known as LTMEAT [Flood].
This method of LTMEAT does not require debug URLs such as chrome://kill
and chrome://hang
.
IMPORTANT NOTICE: YOU CANNOT PERFORM THIS EXPLOIT IF YOU ARE NOT RUNNING A CHROMIUM-BASED BROWSER OR DO NOT HAVE ANY OF THE FILTERING EXTENSIONS ON THE TABLE BELOW INSTALLED.
Folder Setup Methods:
Generate and Import Folder (Automated, Recommended)
Background Page URL:
chrome-extension://extension-id-here/_generated_background_page.html
Copy the Extension ID that corresponds to your filtering extension in the table below and paste it into the placeholder textbox on my personal website and press the Generate Folder button below the textbox to generate the folder.
Setup Folder (Manual)
chrome://bookmarks
.chrome://extensions/?id=[extensionid]
Performing the Exploit:
Instructions:
chrome://extensions
to refresh the extension. If the switch is not available for your extension or the extension does not control web traffic, you may be able to skip this step of the exploit.This method of the LTMEAT exploit may not work permanently for some filtering extensions, depending on how they are built to run in Chrome.
Extensions with Manifest V3 are not compatible with any version of the LTMEAT exploit.
Supported Extensions:
Extension Name: | Extension ID: |
---|---|
Securly (external) | joflmkccibkooplaeoinecjbmdebglab |
Securly (webstore) | iheobagjkfklnlikgihanlhcddjoihkg |
GoGuardian | haldlgldplgnggkjaafhelgiaglafanh |
LANSchool | baleiojnjpgeojohhhfbichcodgljmnj |
Linewize | ddfbkhpmcdbciejenfcolaaiebnjcbfc |
Blocksi | ghlpmldmjjhmdgmneoaibbegkjjbonbk |
Fortiguard | igbgpehnbmhgdgjbhkkpedommgmfbeao |
Cisco Umbrella | jcdhmojfecjfmbdpchihbeilohgnbdci |
ContentKeeper | jdogphakondfdmcanpapfahkdomaicfa |
Securly Classroom | jfbecfmiegcjddenjhlbhlikcbfmnafd |
Hapara | kbohafcopfpigkjdimdcdgenlhkmhbnc |
iBoss | kmffehbidlalibfeklaefnckpidbodff |
CK-Authenticator G3 | odoanpnonilogofggaohhkdkdgbhdljp |
Lightspeed Filter Agent | adkcpkpghahmbopkjchobieckeoaoeem |
Lightspeed Classroom | kkbmdgjggcdajckdlbngdjonpchpaiea |
InterCLASS Filtering Service | jbddgjglgkkneonnineaohdhabjbgopi |
InterSafe GatewayConnection Agent | ecjoghccnjlodjlmkgmnbnkdcbnjgden |
Gopher Buddy | cgbbbjmgdpnifijconhamggjehlamcif |
LanSchool Web Helper | honjcnefekfnompampcpmcdadibmjhlk |
IMTLazarus | cgigopjakkeclhggchgnhmpmhghcbnaf |
Impero Backdrop | jjpmjccpemllnmgiaojaocgnakpmfgjg |
Mobile Guardian | fgmafhdohjkdhfaacgbgclmfgkgokgmb |