Dear /dev/null, You can try this one:
DigitalScream, Windows named pipes exploitation http://www.phrack.org/phrack/61/p61-0x03_Linenoise.txt In addition to explanations there are references to real-world exploits. --Friday, May 12, 2006, 6:16:11 PM, you wrote to [email protected]: dn> Hello list, dn> does anyone know a practical example of named pipe attack to escalate dn> privileges in Windows environment? I'm trying to learn more about named pipe dn> attacks so any link/paper suggestion would be much appreciated (I already dn> found "Discovering and Exploiting Named Pipe Security Flaws for Fun and dn> Profit"). dn> Thank you very much. dn> -E. dn> ____________________ dn> http://www.email.si/ dn> _______________________________________________ dn> Full-Disclosure - We believe in it. dn> Charter: http://lists.grok.org.uk/full-disclosure-charter.html dn> Hosted and sponsored by Secunia - http://secunia.com/ -- ~/ZARAZA . () _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
AdmID:621DCD03F4F5FED7C7F35811690A1EB6
_______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
