On Sat, 16 Feb 2008 04:54:48 -0600, Sebastian G. <seppi@seppig.de> wrote:
> shatter attacks
It is as easy as: Wikipedia:In computing, a shatter attack is a
programming technique employed by hackers on Microsoft Windows operating
systems that can be used to bypass security restrictions between processes
in a session. A shatter attack takes advantage of a design flaw in
Windows's message-passing system whereby arbitrary code could be injected
into any other running application or service in the same session, that
makes use of a message loop. This could result in a privilege escalation
exploit.
--
Bear Bottoms
Freeware Website http://bearware.info


Reply With Quote

