Injective Code Inside an Import Table
Learn to inject your code into an Import Table of a Portable Executable file format. This is called the API redirection technique.
Learn to inject your code into an Import Table of a Portable Executable file format. This is called the API redirection technique.
Learn the five steps needed to inject your code in a portable executable (EXE, DLL, OCX,...) file without recompiling the source code.
Learn to implement discretionary access control on securable NT objects.
Learn how to retrieve a current user's basic security information, such as the fully qualified user name (with domain or workgroup), whether the user is authenticated, and the authentication type.
The second article in the "Keystroke Logger and more" series. Learn about the principle of MSN Messenger Hooking in version 5 of MSN and before.
Learn about keystroke logging and related technical topics. The concepts covered include "Interception of Meaningful Strokes Only" (includes password fields), MSN Messenger chat, IE form, Windows Login screen, and the mechanisms of Log detection.
With .NET, there's no excuse for skimping on security. When you build .NET applications, you get a lot of security code without writing it yourself. Kate presents the code you need to implement role based security using Managed C++.
Anyone who has ever used advanced security in Windows NT has probably run across SIDs before. SID is an acronym for Security IDentifier. All the Win32 API that work with SIDs use a binary representation. This article shows how to convert between string and binary representations of SIDs.
Obtaining session keys as plain text.
Illustrates how to modify the registry to effectively "lock down" an NT machine so that users have only the access to system functions that you allow - great for machines where public access is allowed