From the course: CISSP Cert Prep (2021): 8 Software Development Security
Unlock the full course today
Join today to access over 22,600 courses taught by industry experts or purchase this course individually.
Driver manipulation
From the course: CISSP Cert Prep (2021): 8 Software Development Security
Driver manipulation
- [Instructor] Sophisticated attackers may reach down into device drivers and manipulate them in ways that undermine security. Let's talk about driver factoring and driver shimming. Device drivers play an important role in computing. They serve as the software interface between hardware devices and the operating system. Device drivers are the reason that you can use almost any printer from a wide variety of manufacturers with Windows or any other operating system. Microsoft doesn't need to design Windows to work with every individual printer on the market. Instead, they provide printer manufacturers with the ability to write Windows drivers for their printers. When a manufacturer builds a new printer, they also design a driver that provides Windows with instructions on how to interact with that printer. Device drivers require low level access to the operating system and they run with administrative privileges. If an…
Contents
-
-
-
-
-
(Locked)
OWASP Top 105m 36s
-
(Locked)
Application security4m 13s
-
(Locked)
Preventing SQL injection4m 25s
-
(Locked)
Understanding cross-site scripting3m 17s
-
(Locked)
Request forgery4m 8s
-
(Locked)
Defending against directory traversal3m 6s
-
(Locked)
Overflow attacks3m 21s
-
(Locked)
Explaining cookies and attachments4m 25s
-
(Locked)
Session hijacking4m 8s
-
(Locked)
Code execution attacks2m 43s
-
(Locked)
Privilege escalation1m 56s
-
(Locked)
Driver manipulation2m 16s
-
(Locked)
Memory vulnerabilities3m 34s
-
(Locked)
Race condition vulnerabilities2m 13s
-
(Locked)
-
-
-