Jump to content
Nytro

Token Kidnapping's Revenge

Recommended Posts

Token Kidnapping's Revenge

Author: Cesar Cerrudo

(cesar.at.argeniss.dot.com)

Abstract

This document describes some Microsoft Windows elevation of privilege vulnerabilities, how

they were found with the use of simple tools and how they can be exploited. Starting with a

little security issue that then leads to more significant vulnerabilities finding. All the

vulnerabilities detailed here are not publicly know at the time of this document release.

Table of contents
Table of contents.................................................................................................................................2
Abstract................................................................................................................................................3
Introduction.........................................................................................................................................4
Some theory.........................................................................................................................................5
The Tools.............................................................................................................................................6
Finding the vulnerabilities...................................................................................................................6
Bypassing Microsoft fix for Token Kidnapping on Windows 2003 and XP.....................................10
Preventing exploitation......................................................................................................................13
Conclusion.........................................................................................................................................14
Special Thanks...................................................................................................................................15
About the author................................................................................................................................16
References.........................................................................................................................................17
About Argeniss..................................................................................................................................18

Download:

http://www.exploit-db.com/download_pdf/17256

Link to comment
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.



×
×
  • Create New...