You Snooze You Lose: RPC-Racer Winning RPC Endpoints Against Services
See how a SafeBreach Labs researcher discovered a vulnerability within the Windows RPC protocol he exploited to masquerade as a legitimate, built-in service to force a protected process to authenticate against a server of his choosing.
Copy and paste this URL into your WordPress site to embed
Copy and paste this code into your site to embed