|
You are here |
www.alex-ionescu.com | ||
| | | | |
scriptjunkie.us
|
|
| | | | | [AI summary] The post details eight specific Windows features and services, such as SCM and Task Scheduler, that can be exploited to perform authenticated remote code execution on networked systems. | |
| | | | |
ntamonsec.blogspot.com
|
|
| | | | | 0x00 Abstract Almost all the actions carried out by user mode applications and Windows executive subsystems (e.g. I/O Manager, Memory Manag... | |
| | | | |
www.catch22.net
|
|
| | | | | Introduction to Device Drivers Seeing as I've been spending alot of time doing kernel-level programming recently I thought it was time I wrote a few articles on the subject. This first article (and the rest in this "kernel" series) will cover the steps needed to build, install and start a Windows NT device-driver. | |
| | | | |
jericho.blog
|
|
| | | What is a "zero day vulnerability"? It's a term that is frequently used in the vulnerability disclosure ecosystem. I have blogged on this topic frequently and reading some of this will give more history and context, so I won't rehash everything. If you read one blog, make it "No One Will Burn A Zero Day... | ||