Good article, but I wish the author would've addressed securing these named pipes.<p>Consider that if a user-mode application can send messages to a privileged process (like a Windows service).<p>What prevents <i>any</i> user-mode application from doing that? And if your Windows service is running as "NT_AUTHORITY/SYSTEM" and even executes privileged commands, well you might find you've got a simple privilege escalation vuln.<p>Remember, secure your named pipes...especially when the named pipe server runs as SYSTEM.<p>- <a href="https://stackoverflow.com/a/59983266" rel="nofollow">https://stackoverflow.com/a/59983266</a><p>- <a href="https://versprite.com/blog/security-research/vulnerable-named-pipe-application/" rel="nofollow">https://versprite.com/blog/security-research/vulnerable-name...</a>