Completed
Injecting Code with WNF
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Windows Notification Facility - Peeling the Onion of the Most Undocumented Kernel Attack Surface Yet
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 About Alex lonescu
- 3 What is WNF?
- 4 Why does WNF exist?
- 5 State Name Lifetime
- 6 State Scopes
- 7 Sequence Numbers
- 8 Registering a WNF State Name
- 9 Publishing WNF State Data
- 10 Consuming WNF Data
- 11 WNF Notifications
- 12 High Level API
- 13 Notification Callback
- 14 Kernel API
- 15 WNF Name Instance
- 16 WNF Scope Instance
- 17 WNF Scope Map
- 18 WNF Subscription
- 19 WNF Process Context
- 20 WinDBG Custom Extension
- 21 The O-byte Write
- 22 The Privileged Disclosure
- 23 The Modern App Launcher Blocker
- 24 The Crashing Service
- 25 Discovering State Names and Permissions
- 26 Discovering Volatile Names
- 27 Brute Forcing Security Descriptors
- 28 Creating custom WNF State Names
- 29 EDR/AM Visibility Options
- 30 Controlling the System with WNF
- 31 Interesting Insider Settings
- 32 Injecting Code with WNF
- 33 Modifying Callbacks/Contexts for Code Redirection
- 34 Key Takeaways