Completed
Token Reference Count
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Metasploit Windows Kernel Exploitation
Automatically move to the next video in the Classroom when playback concludes
- 1 Introduction
- 2 About me
- 3 Metasploit
- 4 Why do we care
- 5 Vulnerabilities
- 6 Common Vulnerability Classes
- 7 Null Pointer Dereference
- 8 Use After Pointer
- 9 Reliable Code Execution
- 10 Conditioning
- 11 Useful Object
- 12 Mitigation Technologies
- 13 NoPage Mapping
- 14 Kernel Exploits
- 15 Ruby Implementation
- 16 C Implementation
- 17 Reliability
- 18 Corrupted Structures
- 19 Token Reference Count
- 20 Returning Control
- 21 Shell Code
- 22 Closing Thoughts
- 23 Cool Prizes
- 24 Further Reading
- 25 Thank You