Privilege escalation

Results: 82



#Item
21Privilege escalation / Lenovo / Vulnerability / Code signing / Malware / Privilege / Access token / Ring / Computer security / Computing / Cyberwarfare

IOActive Security Advisory Title Lenovo’s System Update Uses a Predictable Security Token Severity

Add to Reading List

Source URL: www.ioactive.com

Language: English
22Computer security / Windows NT / Access token / Privilege escalation / Architecture of Windows NT / Kernel / Linux kernel / Windows Vista / Operating system / Microsoft Windows / Software / Computing

TECHNICAL WHITE PAPER Easy local Windows Kernel exploitation Abstract In this paper I detail how to easily exploit some kind of windows kernel vulnerabilities. This is

Add to Reading List

Source URL: media.blackhat.com

Language: English - Date: 2012-07-22 17:40:37
23Computer architecture / Unified Extensible Firmware Interface / Privilege escalation / Firmware / Windows 8 / Rootkit / Booting / Personal computer hardware / System Management Mode / BIOS / System software / Computing

Extreme Privilege Escalation On Windows 8/UEFI Systems Corey Kallenberg Xeno Kovah John Butterworth Sam Cornwell

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:07
24Computer security / Cryptographic protocols / Secure communication / Smartphones / HTTP Secure / Ransomware / Privilege escalation / Cipher / China Internet Network Information Center / Malware / Computing / Cyberwarfare

Security Now! #Q&A #210  This week on Security Now! ● ● ●

Add to Reading List

Source URL: www.grc.com

Language: English - Date: 2015-04-14 13:01:48
25Computer network security / Virtual private networks / Brocade Communications Systems / System administration / Brocade / Vyatta / Password / Privilege escalation / Debian / Software / Computer security / System software

Brocade Vyatta 5400 vRouter Low-Risk Vulnerabilities

Add to Reading List

Source URL: www.brocade.com

Language: English - Date: 2014-10-03 17:38:53
26Cyberwarfare / Embedded Linux / Cloud clients / Hacking / Software testing / Android / Vulnerability / Intent / Privilege escalation / Smartphones / Computing / Computer security

Improving the Security of Android Inter-Component Communication Adam Cozzette,∗ Kathryn Lingel,∗ Steve Matsumoto,∗ Oliver Ortlieb,∗ Jandria Alexander,† Joseph Betser,† Luke Florer,† Geoff Kuenning,∗ John

Add to Reading List

Source URL: www.lasr.cs.ucla.edu

Language: English - Date: 2014-07-08 18:06:34
27Antivirus software / Shellcode / Privilege escalation / INCA Internet / Linux kernel / Architecture of Windows NT / Windows Registry / Zero-day attack / Ioctl / Computer security / System software / Software

Anti-Virus Software 0Day Party MJ0011 Agenda

Add to Reading List

Source URL: powerofcommunity.net

Language: English - Date: 2010-12-06 04:41:42
28

Physical Privilege Escalation and Mitigation in the x86 World Oded Horovitz & Steve Weis PrivateCore Inc. About Us

Add to Reading List

Source URL: cansecwest.com

- Date: 2013-03-24 08:07:50
    29Cross-platform software / Computer security / Patch / Cross-site scripting / Ksplice / Privilege escalation / Sandbox / PHP / Common Vulnerabilities and Exposures / Software / Computing / System software

    Hot-Patching a Web Server: a Case Study of ASAP Code Repair Mathias Payer Thomas R. Gross

    Add to Reading List

    Source URL: bitblaze.cs.berkeley.edu

    Language: English - Date: 2013-07-16 19:15:03
    30Human–computer interaction / Firefox / Google Chrome / Web browser / JavaScript / Privilege escalation / Principle of least privilege / World Wide Web / Cascading Style Sheets / Software / Computing / Software testing

    A Quantitative Evaluation of Privilege Separation in Web Browser Designs Xinshu Dong, Hong Hu, Prateek Saxena, and Zhenkai Liang Department of Computer Science, National University of Singapore {xdong, huhong, prateeks,

    Add to Reading List

    Source URL: www.comp.nus.edu.sg

    Language: English - Date: 2014-03-14 01:33:25
    UPDATE