Full Disclosure mailing list archives
Re: escalating privileges with named pipes
From: 3APA3A () SECURITY NNOV RU
Date: Fri, 12 May 2006 14:07:13 -0400
Dear /dev/null, You can try this one: DigitalScream, Windows named pipes exploitation http://www.phrack.org/phrack/61/p61-0x03_Linenoise.txt In addition to explanations there are references to real-world exploits. --Friday, May 12, 2006, 6:16:11 PM, you wrote to full-disclosure () lists grok org uk: dn> Hello list, dn> does anyone know a practical example of named pipe attack to escalate dn> privileges in Windows environment? I'm trying to learn more about named pipe dn> attacks so any link/paper suggestion would be much appreciated (I already dn> found "Discovering and Exploiting Named Pipe Security Flaws for Fun and dn> Profit"). dn> Thank you very much. dn> -E. dn> ____________________ dn> http://www.email.si/ dn> _______________________________________________ dn> Full-Disclosure - We believe in it. dn> Charter: http://lists.grok.org.uk/full-disclosure-charter.html dn> Hosted and sponsored by Secunia - http://secunia.com/ -- ~/ZARAZA . () _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Attachment:
GWAVADAT.TXT
Description:
_______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Current thread:
- escalating privileges with named pipes /dev/null (May 12)
- Re: escalating privileges with named pipes 3APA3A (May 12)
- Re: escalating privileges with named pipes Andrew R. Reiter (May 12)
- <Possible follow-ups>
- Re: escalating privileges with named pipes 3APA3A (May 12)
- Re: escalating privileges with named pipes 3APA3A (May 12)