Nytro Posted May 7, 2011 Report Posted May 7, 2011 Token Kidnapping's RevengeAuthor: Cesar Cerrudo(cesar.at.argeniss.dot.com)AbstractThis document describes some Microsoft Windows elevation of privilege vulnerabilities, howthey were found with the use of simple tools and how they can be exploited. Starting with alittle security issue that then leads to more significant vulnerabilities finding. All thevulnerabilities detailed here are not publicly know at the time of this document release.Table of contentsTable of contents.................................................................................................................................2Abstract................................................................................................................................................3Introduction.........................................................................................................................................4Some theory.........................................................................................................................................5The Tools.............................................................................................................................................6Finding the vulnerabilities...................................................................................................................6Bypassing Microsoft fix for Token Kidnapping on Windows 2003 and XP.....................................10Preventing exploitation......................................................................................................................13Conclusion.........................................................................................................................................14Special Thanks...................................................................................................................................15About the author................................................................................................................................16References.........................................................................................................................................17About Argeniss..................................................................................................................................18Download:http://www.exploit-db.com/download_pdf/17256 Quote