Finding a Weak Link - Attacking Windows OEM Kernel Drivers

Finding a Weak Link - Attacking Windows OEM Kernel Drivers

via YouTube Direct link

How Function Call

26 of 40

26 of 40

How Function Call

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Finding a Weak Link - Attacking Windows OEM Kernel Drivers

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Introduction
  2. 2 Driver Quarry
  3. 3 WhenTosh
  4. 4 Drivers
  5. 5 Fuzz
  6. 6 Fuzz Improvements
  7. 7 Fuzz Crashes
  8. 8 Driver Verifier
  9. 9 Being Exploitable
  10. 10 Annalise
  11. 11 IO Request Packet
  12. 12 Design Ideas
  13. 13 Identify Windows Drivers
  14. 14 Identify WDF Functions
  15. 15 WDF Tools
  16. 16 Device Type
  17. 17 API Calls
  18. 18 Lenovo Driver
  19. 19 Tale to Box
  20. 20 Space Division
  21. 21 Memory Gaining
  22. 22 Local Denial Service
  23. 23 Memory Read
  24. 24 MyAppleAmbler
  25. 25 Immortal Function
  26. 26 How Function Call
  27. 27 For Loop
  28. 28 Read Secrets
  29. 29 Locker Overview
  30. 30 Memory
  31. 31 heuristics
  32. 32 cloud options
  33. 33 example
  34. 34 decryption
  35. 35 what would really be like
  36. 36 TLDR
  37. 37 Wrapup
  38. 38 Tools
  39. 39 Drivers you found
  40. 40 Did they make it

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.