Professional Documents
Culture Documents
Need To Learn
Need To Learn
buffer overflows and stack overflows create DLLs and loading,unloading of Dlls using windows api to create a program and write advanced programs HOW A REMOTE EXPLOIT actually happens how to exploit a software if firewall is turned on default DLLs and default functions(meaning which are present in every version of windows) in DLLs token implementation and how to get impersonation token of system What are the priveleges got, if i create a process under a system process(meanin g access rights) vmock----