Overview
Syllabus
Introduction
Overview
Colonel
Exploit
User API
Firewall Considerations
Exception Handling
Memory Dump Analysis
Redirect Execution
Clean Return
Send Vulnerability
Kernel Heap Overflow
Overwrite
Colonel Loader
GetProcAddress
Predict Stack
Dispatch Level
Userland Shell
Ring 3 Map
APC
Bomberfish Demo
Colonel Keylogger
Keystroke Capture
Interrupt Vector
Overriding Kernel Code
Overriding IDT
Modular structure
ICMP echo handler
Custom keyboard handler
Colonel payloads
Real mode
The sickest room
The boring part
Preventing interruptions
Copying
payload
the payload
Taught by
Black Hat