Very interesting and surprising read :-) About local NTLM local auth token stealing, we recently discovered this other path:https://decoder.cloud/2019/12/06/we-thought-they-were-potatoes-but-they-were-beans/ …
-
-
- Još 2 druga odgovora
Novi razgovor -
-
-
Sounds cool, I will take a look ASAP, reviewing Win services was in my ToDo list for this year, it seems you got it first :)
-
Well I'm only taking it from a very restrictive resource access perspective. There's plenty of stuff to revisit :-)
- Još 1 odgovor
Novi razgovor -
-
-
ooooh nice a
@tiraniddo blog that I actually understood at least 80% of, that's a nice start for the new year!Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
-
-
"Security boundary" was a term coined by
@markrussinovich to criticize UAC. It has been misunderstood ever since. My take, which Mark agreed with, is that a "Security boundary" is a trust boundary that the vendor has consistently defended over a long period of time. -
That vendors improperly decline to defend certain trust boundaries doesn't make the security implications and attacks against those boundaries go away. I guess you could call those "insecurity boundaries".
- Još 3 druga odgovora
Novi razgovor -
-
-
Thank you James and happy new year
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
-
-
Figures that they’d screw up their special snowflake DRM process audiodg.exe.
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.