[prev in list] [next in list] [prev in thread] [next in thread] 

List:       pen-test
Subject:    Using windows access tokens for post-exploitation
From:       Luke Jennings <luke.jennings () mwrinfosecurity ! com>
Date:       2008-04-21 8:52:44
Message-ID: 480C55DC.70405 () mwrinfosecurity ! com
[Download RAW message or body]


Hey guys,

I recently got round to writing the whitepaper version of my Defcon 15
and CCC talk. It is about the security implications of windows access
tokens and is very much focused on how they can be exploited during
penetration testing.

For those who are interested, please find the PDF link and sourceforge
link to the accompanying tool below: -

http://www.mwrinfosecurity.com/publications/mwri_security-implications-of=
-windows-access-tokens_2008-04-14.pdf
http://sourceforge.net/projects/incognito


["signature.asc" (application/pgp-signature)]

[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic