Hello list, does anyone know a practical example of named pipe attack to escalate privileges in Windows environment? I'm trying to learn more about named pipe attacks so any link/paper suggestion would be much appreciated (I already found "Discovering and Exploiting Named Pipe Security Flaws for Fun and Profit").
Thank you very much. -E. ____________________ http://www.email.si/ _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
