Practical Windows Kernel Exploitation

Practical Windows Kernel Exploitation

via YouTube Direct link

No Page Mapping

12 of 27

12 of 27

No Page Mapping

Class Central Classrooms beta

YouTube playlists curated by Class Central.

Classroom Contents

Practical Windows Kernel Exploitation

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 Agenda
  3. 3 Improving Reliability
  4. 4 Why Exploit
  5. 5 Google Security Research
  6. 6 Common Vulnerability Classes
  7. 7 What is it
  8. 8 How to exploit it
  9. 9 How to replace it
  10. 10 WND Object
  11. 11 Mitigation Technologies
  12. 12 No Page Mapping
  13. 13 Disabling SMS
  14. 14 Metasploit
  15. 15 Ruby
  16. 16 Sea implementations
  17. 17 Environment detection
  18. 18 Shellcode
  19. 19 Source of instability
  20. 20 Corrupted structures
  21. 21 Token reference count
  22. 22 Returning control
  23. 23 System Service Post Call
  24. 24 Return on Success
  25. 25 Windows Local Privilege Escalation
  26. 26 Closing Thoughts
  27. 27 Windows 10 Win32

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.