|
You are here |
www.acepace.net | ||
| | | | |
csandker.io
|
|
| | | | | Compared to Linux, the Window's authorization process is quite complex and quite a few actors and objects are involved in this process. As a result, there a lot of terms and acronyms that must be known in order to understand and follow up on the topic. To get an idea of what is covered in this guide take a look on this overview of terms and acronyms... | |
| | | | |
pwning.systems
|
|
| | | | | The following are some of the bugs I discovered: 2022 CVE-2022-26743: An out-of-bounds write issue was addressed with improved bounds checking. This issue is fixed in macOS Monterey 12.4. An attacker that has already achieved code execution in macOS Recovery may be able to escalate to kernel privileges. - Self note: This was both a write and a read of a user controlled size at a user controlled offset. | |
| | | | |
labs.bluefrostsecurity.de
|
|
| | | | | An Analysis of the Windows kernel vulnerability CVE-2014-4113, demonstrating how it can successfully be exploited on Windows 8.1 | Bluefrostsecurity. | |
| | | | |
www.techinterviewhandbook.org
|
|
| | | Study guides for coding interviews with focus on data structures and algorithms, including practice questions, techniques, time complexity and recommended resources | ||