Wednesday, April 26, 2006

Operating System Exploits and Vulnerabilities

An Operating System is a set of programs that launch at boot-up to control what loads on start-up. These core system files control everything from mounting a drive to accepting input from the mouse and keyboard. An exploitable vulnerability in one of these low-level system processes can be extremely critical because they reside deep within the core of the trusted computer model and can easily bypass anything installed later on in the boot-order. If you can remote code execute an Operating System exploitable vulnerability in a low-level core system file, you can bypass the outer security shell and strike directly at the heart of the computer.