Stephen Sims is an industry expert with over 15 years of experience in information technology and security. Stephen currently works out of San Francisco as a consultant performing reverse engineering, exploit development, threat modeling, and penetration testing.

The technique of stealing the token of a process with higher privileges in order to achieve privilege escalation is often used during Kernel exploitation.

Episode 351 Show Notes

Episode 351 (mp3)

Tune in to PaulDotCom Security Weekly TV, Hack Naked TV, and Hack Naked At Night episodes on our
YouTube Channel
or our Bliptv channel.

About the author