Tag
high
advisory
Privilege Escalation via Rogue Named Pipe Impersonation
2 rules 1 TTPAn adversary may attempt privilege escalation by masquerading as a known named pipe and manipulating a privileged process to connect to it on Windows systems.
privilege-escalation
named-pipe
windows
2r
1t
high
advisory
Privilege Escalation via Named Pipe Impersonation
2 rules 1 TTPAdversaries may escalate privileges by abusing named pipe impersonation, a technique often used with tools like Metasploit's meterpreter getsystem command, where a process writes to a named pipe to facilitate a SYSTEM-token handoff.
Microsoft Defender XDR +4
privilege-escalation
named-pipe
windows
2r
1t