Completed
Being Exploitable
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Finding a Weak Link - Attacking Windows OEM Kernel Drivers
Automatically move to the next video in the Classroom when playback concludes
- 1 Introduction
- 2 Driver Quarry
- 3 WhenTosh
- 4 Drivers
- 5 Fuzz
- 6 Fuzz Improvements
- 7 Fuzz Crashes
- 8 Driver Verifier
- 9 Being Exploitable
- 10 Annalise
- 11 IO Request Packet
- 12 Design Ideas
- 13 Identify Windows Drivers
- 14 Identify WDF Functions
- 15 WDF Tools
- 16 Device Type
- 17 API Calls
- 18 Lenovo Driver
- 19 Tale to Box
- 20 Space Division
- 21 Memory Gaining
- 22 Local Denial Service
- 23 Memory Read
- 24 MyAppleAmbler
- 25 Immortal Function
- 26 How Function Call
- 27 For Loop
- 28 Read Secrets
- 29 Locker Overview
- 30 Memory
- 31 heuristics
- 32 cloud options
- 33 example
- 34 decryption
- 35 what would really be like
- 36 TLDR
- 37 Wrapup
- 38 Tools
- 39 Drivers you found
- 40 Did they make it