Vulnerability Development mailing list archives
RE: Windows Elevation of privileges
From: "Majid Almassari" <majid () networkingmedia org>
Date: Tue, 12 Mar 2002 15:00:39 -0800
PipeUpAdmin by Maceo http://www.dogmile.com/files Netddemsg.cpp, source code for netddemesg by @stake: http://www.atstake.com/research/advisories/2001/netddemsg.cpp There is also a full chapter (ch 6) in Hacking Windows 2000 Exposed that talks about Escalation of Privileges. SANS for various articles like: http://www.sans.org/newlook/digests/ntarchives/113001.htm CSI and the FBI's joint annual survey of computer crime statistics: http://www.gocsi.com Regards, Majid Almassari Network Specialist UW School of Nursing Tel. (206) 221-7135 PGP KeyID: 0xA2CD1B94 PGP Fingerprint: 8FBE 9617 B5B8 8E64 5ABB EBB9 98D0 FB1E A2CD 1B94 -----Original Message----- From: Sebastian Muñiz [mailto:smuniz () elinpar com] Sent: Tuesday, March 12, 2002 10:36 AM To: vuln-dev () securityfocus com Subject: Windows Elevation of privileges Does anyone know where can i find some papers about Elevation of privileges on Windows (NT/2000) or source code of actual exploits of the kind (like sechole) ?? Thanks!!!! Sebastian Muñiz Elinpar S.A..- Ingenieria / Serv. Profesionales
Current thread:
- Windows Elevation of privileges Sebastian Muñiz (Mar 12)
- Re: Windows Elevation of privileges Arturo "Buanzo" Busleiman (Mar 12)
- Re: Windows Elevation of privileges H D Moore (Mar 12)
- RE: Windows Elevation of privileges Majid Almassari (Mar 12)
- RE: Windows Elevation of privileges Bejon Parsinia (Mar 12)
- Re: Windows Elevation of privileges Blake Watts (Mar 12)