nt!_SEP_TOKEN_PRIVILEGES Single Write EoP Protection

Discussion in 'News Aggregator' started by Packet Storm, 22 Apr 2017.

  1. Packet Storm

    Packet Storm Guest

    This is a write up detailing how abusing enabled token privileges through a kernel exploit to gain elevation of privilege won't be enough anymore. From NT kernel version 10.0.15063 they are checked against the privileges present in the token of the calling process so an attacker needs to use two writes.

    Continue reading...
     

Share This Page

Loading...