Date: August 13, 2024
Pentester: Eno Leriand
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| accesschk -w -s -u Users "C:\Program Files" >> programfiles.txt | |
| accesschk -w -s -u Everyone "C:\Program Files" >> programfiles.txt | |
| accesschk -w -s -u "Authenticated Users" "C:\Program Files" >> programfiles.txt | |
| accesschk -w -s -u Interactive "C:\Program Files" >> programfiles.txt | |
| accesschk -w -s -u "This Organization" "C:\Program Files" >> programfiles.txt | |
| accesschk -w -s -u "Authentication authority asserted identity" "C:\Program Files" >> programfiles.txt | |
| accesschk -w -s -u "Mandatory Label\Medium Mandatory Level" "C:\Program Files" >> programfiles.txt | |
| accesschk -w -s -u %username% "C:\Program Files" >> programfiles.txt | |
| accesschk -w -s -u Users "C:\Program Files (x86)" >> programfilesx86.txt |
Shared memory is an efficient means of passing data between programs. Because two or more processes can use the same memory space, it has been discovered that, since shared memory is, by default, mounted as read/write, the /run/shm space can be easily exploited.
That translates to a weakened state of security.
If you’re unaware, shared memory can be used in an attack against a running service. Because of this, you’ll want to secure that portion of system memory.