Privilege Escalation


If you are not new to rootkits, then you are probably not new to privilege escalation exploits. This is often accomplished by exploiting a vulnerability in an administrative-level routine and using that permission level to perform some operation. Actual installation exploits are beyond the scope of this book, but an internet check (Google) using “exploit vulnerability privilege escalation (Microsoft OR Windows)” should get you on the right track.




Professional Rootkits
Professional Rootkits (Programmer to Programmer)
ISBN: 0470101547
EAN: 2147483647
Year: 2007
Pages: 229
Authors: Ric Vieler

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net