Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Exploiting Hardcore Pool Corruptions in MS Windows Kernel

Hack In The Box Security Conference via YouTube

Overview

Explore advanced techniques for exploiting kernel pool corruptions in Microsoft Windows operating systems, from NT 4.0 to Windows 8. Delve into the challenges posed by enhanced security measures in Windows kernel pool allocators and learn about a 100% reliable exploitation method that overcomes these obstacles. Discover solutions for scenarios where traditional exploitation techniques fail, such as uncontrolled data overflow, constant (zero byte) corruptions, and continuous overflows leading to page faults and system crashes. Gain insights from security researcher Nikita Tarakanov's expertise in Windows NT Kernel exploitation, reverse engineering, and vulnerability research. Understand the significance of kernel-level vulnerabilities in bypassing security measures like sandboxes, and how Microsoft's ongoing efforts to improve kernel security impact exploit development.

Syllabus

#HITB2013AMS D1T2 Nikita Tarakanov - Exploiting Hardcore Pool Corruptions in MS Windows Kernel

Taught by

Hack In The Box Security Conference

Reviews

Start your review of Exploiting Hardcore Pool Corruptions in MS Windows Kernel

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.