April 2024
Intermediate to advanced
608 pages
17h 13m
English

In the previous chapter, we discussed the various structures that make up a security descriptor. You also learned how to manipulate security descriptors in PowerShell and how to represent them using the SDDL format. In this chapter, we’ll discuss how to read security descriptors from kernel objects, as well as the more complex process of assigning security descriptors to these objects.
We’ll focus our discussion on the security descriptors assigned to kernel objects. However, as mentioned in “Absolute and Relative Security Descriptors” on page 149, it’s also possible to store a security descriptor ...
Read now
Unlock full access