Posts Tagged “Kernel Exploitation”
-
[Kernel Exploitation] 7: Arbitrary Overwrite (Win7 x86)
This post discusses what an arbitrary overwrite (or write-what-where) vulnerability is and how it can be exploited.
-
[Kernel Exploitation] 6: NULL pointer dereference
Null page dereference vulnerabilities, what they are, how to exploit them and how they're mitigated.
-
[Kernel Exploitation] 5: Integer Overflow
Part 5 discusses a common vulnerability class called integer overflow.
-
[Kernel Exploitation] 4: Stack Buffer Overflow (SMEP Bypass)
Building up on part 3, this post shows how exploitation is done on a Windows 10 machine with SMEP enabled.
-
[Kernel Exploitation] 3: Stack Buffer Overflow (Windows 7 x86/x64)
Demonstrates the exploit development phases of a stack buffer overflow in kernel on Windows 7 x86 and x64
-
[Kernel Exploitation] 2: Payloads
Discusses payloads to be used in upcoming posts
-
[Kernel Exploitation] 1: Setting up the environment
Discusses configuring the target VMs, loading the vulnerable driver and configuring WinDBG.