Главная
Study mode:
on
1
Intro
2
core Services
3
Introduction To Key Terms
4
Connecting To A Named Pipe
5
Ppe ACLS And Connection Limitation
6
Enumerating And Scanning For Named Pipes
7
Snilling Named Pipes Content
8
Fuzzing Named Pipes
9
Exploitation And Impact
10
Mitigation And Defense
11
Closing remarks
Description:
Explore the often-overlooked Windows named pipes interface and its potential security implications in this 27-minute conference talk from Hack in Paris 2017. Delve into how named pipes can be exploited as an application-level entry vector for various attacks, including buffer overflows, denial of service, and code injection. Learn about connecting to named pipes, understanding ACLs and connection limitations, enumeration techniques, content sniffing, and fuzzing methods. Discover the potential impact of named pipe exploitation and gain insights into mitigation strategies and defense mechanisms. Enhance your cybersecurity knowledge by understanding this forgotten interface that could be a potential entry point for attackers.

The Forgotten Interface- Windows Named Pipes - Gil Cohen - Hack in Paris - 2017

Hack in Paris
Add to list