Remote Windows Kernel Exploitation - Step Into the Ring 0

Remote Windows Kernel Exploitation - Step Into the Ring 0

Black Hat via YouTube Direct link

Firewall Considerations

6 of 37

6 of 37

Firewall Considerations

Class Central Classrooms beta

YouTube playlists curated by Class Central.

Classroom Contents

Remote Windows Kernel Exploitation - Step Into the Ring 0

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Introduction
  2. 2 Overview
  3. 3 Colonel
  4. 4 Exploit
  5. 5 User API
  6. 6 Firewall Considerations
  7. 7 Exception Handling
  8. 8 Memory Dump Analysis
  9. 9 Redirect Execution
  10. 10 Clean Return
  11. 11 Send Vulnerability
  12. 12 Kernel Heap Overflow
  13. 13 Overwrite
  14. 14 Colonel Loader
  15. 15 GetProcAddress
  16. 16 Predict Stack
  17. 17 Dispatch Level
  18. 18 Userland Shell
  19. 19 Ring 3 Map
  20. 20 APC
  21. 21 Bomberfish Demo
  22. 22 Colonel Keylogger
  23. 23 Keystroke Capture
  24. 24 Interrupt Vector
  25. 25 Overriding Kernel Code
  26. 26 Overriding IDT
  27. 27 Modular structure
  28. 28 ICMP echo handler
  29. 29 Custom keyboard handler
  30. 30 Colonel payloads
  31. 31 Real mode
  32. 32 The sickest room
  33. 33 The boring part
  34. 34 Preventing interruptions
  35. 35 Copying
  36. 36 payload
  37. 37 the payload

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.