Basics of Win32 Shatter Attacks
security.tombom.co.ukStep by step guide to privilege escalation using shatter attacks. Shatter Attacks use flaws within the Windows API call SetWindowLong() as well as others.
Rate This Site
Embed Badge
Place this code on your website to show you're listed here.