Privilege escalation

Results: 82



#Item
71Computer network security / Identity management / Hacking / Pass the hash / Password / Transaction authentication number / Authentication / Credential / LM hash / Computer security / Security / Cyberwarfare

Mitigating Pass-the-Hash (PtH) Attacks and Other Credential Theft Techniques Mitigating the risk of lateral movement and privilege escalation Mitigating Pass-the-Hash (PtH) Attacks and Other Credential Theft Techniques

Add to Reading List

Source URL: download.microsoft.com

Language: English - Date: 2013-06-11 19:39:01
72Computer network security / Software testing / Blog software / Drupal / SQL injection / Password / HTTP cookie / Privilege escalation / Code injection / Computer security / Cyberwarfare / Software

PDF Document

Add to Reading List

Source URL: crackingdrupal.com

Language: English - Date: 2009-05-05 18:54:11
73Hacking / Software testing / Computer network security / Vulnerability / Adobe Acrobat / Cross-site scripting / Firefox / Privilege escalation / Buffer overflow / Software / Computing / Microsoft Windows

State of Tennessee Department of Finance and Administration Office for Information Resources Security Policy and Audit Security Advisory Summary

Add to Reading List

Source URL: www.nettn.net

Language: English - Date: 2010-09-16 14:51:14
74Smartphones / Apple Inc. / IOS jailbreaking / ITunes / IOS / Rooting / Exclusive Chip ID / App Store / Privilege escalation / Computer hardware / IPhone / Computing

I am writing this comment in response to the exception in DMCA concerning jailbreaking of  smartphones that is about to expire.  It should be renewed and be expanded to include tablets bec

Add to Reading List

Source URL: www.copyright.gov

Language: English - Date: 2012-02-13 15:57:34
75Rootkits / Sony / Copyright law / Digital rights management / Extended Copy Protection / Digital Millennium Copyright Act / MediaMax CD-3 / Edward Felten / Privilege escalation / Software / Computer security / Computing

BEFORE THE COPYRIGHT OFFICE OF THE LIBRARY OF CONGRESS  Docket No. RM 2008­8: In the Matter of Exemption to Prohibition on Circumvention  of Copyright Protection Systems for Access Control T

Add to Reading List

Source URL: www.copyright.gov

Language: English - Date: 2009-02-09 17:57:50
76Multi-touch / Smartphones / IOS / ITunes / Mobile device management / IPad / Mobile application development / Rooting / Privilege escalation / Computing / Software / Electronics

PDF Document

Add to Reading List

Source URL: www.cse-cst.gc.ca

Language: English - Date: 2013-07-16 09:35:39
77Smartphones / IOS jailbreaking / IPhone / Privilege escalation / Address space layout randomization / IOS / Sandbox / Linux kernel / Charlie Miller / Software / System software / Computing

Apple iOS 4 Security Evaluation Dino A. Dai Zovi Trail of Bits LLC Disclaimers I have never worked for Apple, but I have a crippling addiction to

Add to Reading List

Source URL: trailofbits.files.wordpress.com

Language: English - Date: 2011-08-10 11:14:53
78Computer network security / Operating system / Privilege escalation / Kernel / Vulnerability / Ring / Google Chrome OS / Denial-of-service attack / Unix / Computer security / Cyberwarfare / System software

GOOD PRACTICE GUIDE GENERAL ADVICE ON SECURING OPERATING SYSTEMS

Add to Reading List

Source URL: www.cpni.gov.uk

Language: English - Date: 2012-07-20 06:03:57
79Unix / System administration / Cryptographic software / Privilege separation / OpenSSH / Privilege / Secure Shell / Principle of least privilege / Capability-based security / System software / Software / Computer security

Preventing Privilege Escalation Niels Provos CITI, University of Michigan

Add to Reading List

Source URL: www.citi.umich.edu

Language: English - Date: 2003-08-09 19:06:37
80Protected mode / Real mode / Kernel / Ring / Interrupt flag / Virtual 8086 mode / Architecture of Windows NT / Operating system / Privilege escalation / Computer architecture / Programming language implementation / System Management Mode

Using CPU System Management Mode to Circumvent Operating System Security Functions

Add to Reading List

Source URL: www.ssi.gouv.fr

Language: English - Date: 2012-11-06 05:29:24
UPDATE