Completed
How to exploit it
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Practical Windows Kernel Exploitation
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 Agenda
- 3 Improving Reliability
- 4 Why Exploit
- 5 Google Security Research
- 6 Common Vulnerability Classes
- 7 What is it
- 8 How to exploit it
- 9 How to replace it
- 10 WND Object
- 11 Mitigation Technologies
- 12 No Page Mapping
- 13 Disabling SMS
- 14 Metasploit
- 15 Ruby
- 16 Sea implementations
- 17 Environment detection
- 18 Shellcode
- 19 Source of instability
- 20 Corrupted structures
- 21 Token reference count
- 22 Returning control
- 23 System Service Post Call
- 24 Return on Success
- 25 Windows Local Privilege Escalation
- 26 Closing Thoughts
- 27 Windows 10 Win32