nt!_SEP_TOKEN_PRIVILEGES Single Write EoP Protection

This is a write up detailing how abusing enabled token privileges through a kernel exploit to gain elevation of privilege won't be enough anymore. From NT kernel version 10.0.15063 they are checked against the privileges present in the token of the calling process so an attacker needs to use two writes.

MD5 | 30228610ed457bed8670b8f3dcfdd1b6

Related Posts