References

  1. A. Gouglidis, I. Mavridis and V. C. Hu, Security policy verification for multi-domains in cloud systems, International Journal of Information Security, vol. 13, (2), pp. 97-111, 2014. Available: https://search.proquest.com/docview/1509582424. DOI: http://dx.doi.org/10.1007/s10207-013-0205-x.
  2. T. Sommestad and F. Sandström, An empirical test of the accuracy of an attack graph analysis tool, Information and Computer Security, vol. 23, (5), pp. 516-531, 2015. Available: https://search.proquest.com/docview/1786145799.
  3. D. A. Groves, Industrial Control System Security by Isolation: A Dangerous Myth, American Water Works Association.Journal, vol. 103, (7), pp. 28-30, 2011. Available: https://search.proquest.com/docview/878745593.
  4. P. Asadoorian, Windows Privilege Escalation Techniques (Local) - Tradecraft Security Weekly #2 - Security Weekly, Security Weekly, 2017. [Online]. Available: https://securityweekly.com/2017/05/18/windows-privilege-escalation-techniques-local-tradecraft-security-weekly-2/. [Accessed: 16- Aug- 2017].
  5. C. Perez, Meterpreter Token Manipulation, Shell is Only the Beginning, 2017. [Online]. Available: https://www.darkoperator.com/blog/2010/1/2/meterpreter-token-manipulation.html. [Accessed: 16- Aug- 2017].
  6. S. Knight, Exploit allows command prompt to launch at Windows 7 login screen, TechSpot, 2017. [Online]. Available: https://www.techspot.com/news/48774-exploit-allows-command-prompt-to-launch-at-windows-7-login-screen.html. [Accessed: 16- Aug- 2017].
  1. Application Shimming, Attack.mitre.org, 2017. [Online]. Available: https://attack.mitre.org/wiki/Technique/T1138. [Accessed: 16- Aug- 2017].
  2. Bypass User Account Control, Attack.mitre.org, 2017. [Online]. Available: https://attack.mitre.org/wiki/Technique/T1088. [Accessed: 16- Aug- 2017].
  3. DLL Injection, Attack.mitre.org, 2017. [Online]. Available: https://attack.mitre.org/wiki/Technique/T1055. [Accessed: 16- Aug- 2017].
  4. DLL Hijacking Attacks Revisited, InfoSec Resources, 2017. [Online]. Available: http://resources.infosecinstitute.com/dll-hijacking-attacks-revisited/. [Accessed: 16- Aug- 2017].
  5. Dylib-Hijacking Protection, Paloaltonetworks.com, 2017. [Online]. Available: https://www.paloaltonetworks.com/documentation/40/endpoint/newfeaturesguide/security-features/dylib-hijacking-protection.html. [Accessed: 16- Aug- 2017].
  6. T. Newton, Demystifying Shims - or - Using the App Compat Toolkit to make your old stuff work with your new stuff, Blogs.technet.microsoft.com, 2018. [Online]. Available: https://blogs.technet.microsoft.com/askperf/2011/06/17/demystifying-shims-or-using-the-app-compat-toolkit-to-make-your-old-stuff-work-with-your-new-stuff/. [Accessed: 03- Jan- 2018].
  7. DLL Injection - enterprise, Attack.mitre.org, 2018. [Online]. Available: https://attack.mitre.org/wiki/Technique/T1055. [Accessed: 03- Jan- 2018].
..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.145.166.167