Je hebt een klacht over de onderstaande posting:
"Exploiting design flaws in the Win32 API for privilege escalation. This paper is a step-by-step walkthrough of how to exploit one example of this class of flaw. Several other attack methods are discussed, although examples are not given. There are many ways to exploit these flaws, and many variations on each of the stages presented. This is just one example." -> http://security.tombom.co.uk/shatter.html
Beschrijf je klacht (Optioneel):