Privilege escalation

Results: 82



#Item
31Software testing / Hacking / Cross-site scripting / SQL injection / Vulnerability / Privilege escalation / Computer network security / Patch / HP Application Security Center / Computer security / Cyberwarfare / Failure

Microsoft PowerPoint - shmoo2.ppt [Read-Only]

Add to Reading List

Source URL: www.shmoocon.org

Language: English - Date: 2010-11-01 16:38:55
32Hacking / Software testing / Vulnerability / Cross-site scripting / SQL injection / Social vulnerability / Arbitrary code execution / Privilege escalation / Buffer overflow / Computer security / Cyberwarfare / Software

! [removed]: [removed]: [removed]: [removed]: [removed]:

Add to Reading List

Source URL: research.microsoft.com

Language: English - Date: 2005-05-20 17:27:56
33IOS jailbreaking / Superuser / Computing / Smartphone / Prague / Computer security / Cyberwarfare / Security / Malware / Privilege escalation

Mobile Devices Boom Hackers Are Ready. What About You? Tomáš Rosa crypto.hyperlink.cz

Add to Reading List

Source URL: crypto.hyperlink.cz

Language: English - Date: 2013-09-18 10:34:00
34Cloud clients / Portable software / Sandbox / Computer security / Arbitrary code execution / Privilege escalation / Malware / Mandatory Integrity Control / Vulnerability / Software / Google Chrome / Software testing

Sandbox Roulette: Are you ready for the gamble? Rafal Wojtczuk [removed] Rahul Kashyap [removed] What is a sandbox? In computer security terminology, a sandbox is an environment designed to run untrusted

Add to Reading List

Source URL: www.bromium.com

Language: English - Date: 2015-04-10 18:42:25
35Hacking / Software testing / Cross-site scripting / Vulnerability / SQL injection / Privilege escalation / Uncontrolled format string / Arbitrary code execution / Buffer overflow / Cyberwarfare / Computer security / Failure

Benjamin Livshits and Monica S. Lam 1[removed].

Add to Reading List

Source URL: research.microsoft.com

Language: English - Date: 2005-08-06 17:30:40
36Computing / Privilege escalation / Microsoft Windows / X Window System / Malware / Spyware / Software / System software / Windows Vista

Increasing Security and Reducing Costs by Managing Administrator Rights with Process-based Privilege Management with WhatWorks is a user-to-user program in which security managers who have

Add to Reading List

Source URL: www.sans.org

Language: English - Date: 2015-03-27 09:47:54
37Access token / Single sign-on / Token coin / Microsoft Windows / Architecture of Windows NT / Privilege escalation / Pass the hash / Exploit / Security token / Computer security / Cyberwarfare / Security

Security Implications of Windows Access Tokens – A Penetration Tester’s Guide By Luke Jennings 14th April 2008

Add to Reading List

Source URL: labs.mwrinfosecurity.com

Language: English - Date: 2015-04-17 06:42:07
38Unix / Access control / System administration / Cryptographic software / Secure Shell / Privilege separation / OpenSSH / Privilege / Principle of least privilege / System software / Computer security / Software

CITI Technical Report[removed]Preventing Privilege Escalation Niels Provos [removed]

Add to Reading List

Source URL: www.citi.umich.edu

Language: English - Date: 2002-08-05 18:22:53
39

Microsoft Windows COM Structured Storage Local Privilege Escalation Vulnerability 分類 Access Validation Error 関連ツール名称 SSExploit.c 再現性

Add to Reading List

Source URL: www.npa.go.jp

Language: Japanese
    40

    Microsoft Windows Kernel CSRSS Local Privilege Escalation Vulnerability 分類 再現性 Buffer Overflow

    Add to Reading List

    Source URL: www.npa.go.jp

    Language: Japanese
      UPDATE