lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20060315000146.31238.qmail@web54404.mail.yahoo.com>
Date: Tue, 14 Mar 2006 16:01:46 -0800 (PST)
From: Cesar <cesarc56@...oo.com>
To: full-disclosure@...ts.grok.org.uk, bugtraq@...urityfocus.com,
	vulnwatch@...nwatch.org
Subject: WLSI - Windows Local Shellcode Injection - Paper


Hi.

For those who didn't attend to Black Hat Europe nor
EuSecWest, here is the paper on which the presentation
was based.


WLSI - Windows Local Shellcode Injection

Abstract:
This paper describes a new technique to create 100%
reliable local exploits for Windows
operating systems, the technique uses some Windows
operating systems design weaknesses
that allow low privileged processes to insert data on
almost any Windows processes no matter
if they are running under high privileges. We all know
that local exploitation is much easier
than remote exploitation but it has some difficulties.
After a brief introduction and a description
of the technique, a couple of samples (Exploits for
MS05-012 and MS05-040) will be provided so the reader
will be able to write
his/her own exploits.

http://www.argeniss.com/research/WLSI.zip

Enjoy.

Cesar.

__________________________________________________
Do You Yahoo!?
Tired of spam?  Yahoo! Mail has the best spam protection around 
http://mail.yahoo.com 

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ