{
	"id": "5d594f86-79c0-4057-b169-4a61b398fde7",
	"created_at": "2026-04-06T00:10:52.428905Z",
	"updated_at": "2026-04-10T03:20:48.0563Z",
	"deleted_at": null,
	"sha1_hash": "ab452485cfedc68a88f701c63d5aae593df90119",
	"title": "Named Pipes - Win32 apps",
	"llm_title": "",
	"authors": "",
	"file_creation_date": "0001-01-01T00:00:00Z",
	"file_modification_date": "0001-01-01T00:00:00Z",
	"file_size": 40800,
	"plain_text": "Named Pipes - Win32 apps\r\nBy stevewhims\r\nArchived: 2026-04-05 19:08:32 UTC\r\nA named pipe is a named, one-way or duplex pipe for communication between the pipe server and one or more\r\npipe clients. All instances of a named pipe share the same pipe name, but each instance has its own buffers and\r\nhandles, and provides a separate conduit for client/server communication. The use of instances enables multiple\r\npipe clients to use the same named pipe simultaneously.\r\nAny process can access named pipes, subject to security checks, making named pipes an easy form of\r\ncommunication between related or unrelated processes.\r\nAny process can act as both a server and a client, making peer-to-peer communication possible. As used here, the\r\nterm pipe server refers to a process that creates a named pipe, and the term pipe client refers to a process that\r\nconnects to an instance of a named pipe. The server-side function for instantiating a named pipe is\r\nCreateNamedPipe. The server-side function for accepting a connection is ConnectNamedPipe. A client process\r\nconnects to a named pipe by using the CreateFile or CallNamedPipe function.\r\nNamed pipes can be used to provide communication between processes on the same computer or between\r\nprocesses on different computers across a network. If the server service is running, all named pipes are accessible\r\nremotely. If you intend to use a named pipe locally only, deny access to NT AUTHORITY\\NETWORK or switch\r\nto local RPC.\r\nFor more information, see the following topics:\r\nPipe Names\r\nNamed Pipe Open Modes\r\nNamed Pipe Type, Read, and Wait Modes\r\nNamed Pipe Instances\r\nNamed Pipe Operations\r\nSynchronous and Overlapped Input and Output\r\nNamed Pipe Security and Access Rights\r\nImpersonating a Named Pipe Client\r\nUsing Pipes\r\nSource: https://docs.microsoft.com/en-us/windows/win32/ipc/named-pipes\r\nhttps://docs.microsoft.com/en-us/windows/win32/ipc/named-pipes\r\nPage 1 of 1",
	"extraction_quality": 1,
	"language": "EN",
	"sources": [
		"MITRE"
	],
	"references": [
		"https://docs.microsoft.com/en-us/windows/win32/ipc/named-pipes"
	],
	"report_names": [
		"named-pipes"
	],
	"threat_actors": [],
	"ts_created_at": 1775434252,
	"ts_updated_at": 1775791248,
	"ts_creation_date": 0,
	"ts_modification_date": 0,
	"files": {
		"pdf": "https://archive.orkl.eu/ab452485cfedc68a88f701c63d5aae593df90119.pdf",
		"text": "https://archive.orkl.eu/ab452485cfedc68a88f701c63d5aae593df90119.txt",
		"img": "https://archive.orkl.eu/ab452485cfedc68a88f701c63d5aae593df90119.jpg"
	}
}