|
Home > Exploits > Operating System
Operating System:An Operating System is a set of programs that launch at boot-up to control what loads on start-up. These core system files control everything from mounting a drive to accepting input from the mouse and keyboard. An exploitable vulnerability in one of these low-level system processes can be extremely critical because they reside deep within the core of the trusted computer model and can easily bypass anything installed later on in the boot-order. A compiled kernel, which is the brains of an Operating System, is the soft chewy centre. With information security programs like software firewalls and anti-virus programs comprising the hard outer shell. If you can remote code execute an exploitable vulnerability in a low-level core system file, you can bypass the outer security shell and strike directly at the heart of the computer. And any processes you spawn because of these vulnerabilities will be trusted and run as root because of where they are launched from which makes them extremely critical. For a complete Operating System, Browser or E-mail, Software or Hardware exploits and vulnerabilities alphabetical list, see the previous link.
M.S. Graphics Rendering Engine
Copyright (c) 2006-2008 A. Ryan Robbins. All Rights Reserved.
|
|
|