We’ve just published the third and final part in our new series on Windows kernel driver vulnerability research and exploitation.

Exploiting AMD atdcm64a.sys arbitrary pointer dereference - Part 3:
https://security.humanativaspa.it/exploiting-amd-atdcm64a-sys-arbitrary-pointer-dereference-part-3/

In the previous articles, we covered the discovery of an arbitrary MSR read and an arbitrary pointer dereference vulnerability, and successfully confirmed them by putting together two PoCs. This time, we will craft a full exploit that chains both vulnerabilities to enable all privileges on Windows. Happy hacking!

#HumanativaGroup #HNSecurity #VulnerabilityResearch #ExploitDevelopment #Windows

Exploiting AMD atdcm64a.sys arbitrary pointer dereference - Part 3 - hn security

In the previous part of the […]

hn security

I’m really proud of the @hnsec blog!

We published articles about #web and #mobile #appsec, #IoT, #redteaming, #vulndev, #codereview

In a bit more than a couple of years of activity that’s a lot in my opinion. And we have more to come soon!

Well done, #hnsecurity team 💚

https://security.humanativaspa.it/

hn security

Offensive Security Specialists

hn security