Privilege Escalation


If you are not new to rootkits, then you are probably not new to privilege escalation exploits. This is often accomplished by exploiting a vulnerability in an administrative-level routine and using that permission level to perform some operation. Actual installation exploits are beyond the scope of this book, but an internet check (Google) using “exploit vulnerability privilege escalation (Microsoft OR Windows)” should get you on the right track.




Professional Rootkits
Professional Rootkits (Programmer to Programmer)
ISBN: 0470101547
EAN: 2147483647
Year: 2007
Pages: 229
Authors: Ric Vieler

Similar book on Amazon
Rootkits: Subverting the Windows Kernel
Rootkits: Subverting the Windows Kernel
A Guide to Kernel Exploitation: Attacking the Core
A Guide to Kernel Exploitation: Attacking the Core
Reversing: Secrets of Reverse Engineering
Reversing: Secrets of Reverse Engineering
Malware Analyst's Cookbook and DVD: Tools and Techniques for Fighting Malicious Code
Malware Analyst's Cookbook and DVD: Tools and Techniques for Fighting Malicious Code

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net