thank you for that tip my friend, i did not kniw that.
i do prefer to use rufus, simple GUI yet with enough adv. options to get the job done. however, at the time i did not have w10 installed. i only had Mint Live on a 4GB stick and a fresh 1TB WD.
thats good to know about Etcher, thank you. i’ve had issues in the past trying to use it due to incompatibility with their Electron framework, in different envs. as far as the the behavior i experienced trying to run it – it appeared to be an RCI/RCE attempt that was logged. i will try to recreate and if successful, i will forward that along.
i do remember that the .appimage (DL from their off. site), would not run, dbl-click nor term, it did not want to be sandboxed. it referred to at attempt to run arbitratry code inserted into the exec string, and read something like :
" --exec (’ ')/internal/path/etcher.bin "
if i read it correctly, () contained the offending, injected string. however, woeUSB, (‘dus’) variant was successful in creating my win10 bootable using Parrot Sec amd64. despite throwing cautionary disclaimers that it may fail due to it not being run in an emv using the offical Deban kernal. rolled the dice and won.
i have the highest respect, and appreciation for the Parrot Devs, (hi Vlad ), you and this great community… however, prior to any personal mods/config., it did not run the etcher appimage on the amd64 distro, 4.1 release.
my apologies @solo.nepal, for the tl;dr response… i do appreciate your engagement. i will try to recreate the incident and post here as a KEDB tyoe reference.
thanks again my friend.! and yes, my lab, envs, power-tools and collection of malz in source and live to play with… (aka. reverse and study) is coming along great.! .
cheers