HackSys Team

48 Followers
18 Following
16 Posts
This summer [email protected] teaches everything you ever needed to know about Windows Kernel Hacking, all from the comfort of your home or office https://ringzer0.training/doubledown24-windows-kernel-exploitation/
Windows Kernel Exploitation - Foundation and Advanced

Join Ashfaq Ansari for 32 hours of deep dive into the Windows Kernel and Internals. July 20th - 26th.

Ringzer0

๐Ÿ› ๏ธNice introduction to Windows kernel exploitation for beginners

๐Ÿ”นPart 1: https://mdanilor.github.io/posts/hevd-0/
๐Ÿ”นPart 2: https://mdanilor.github.io/posts/hevd-1/
๐Ÿ”นPart 3: https://mdanilor.github.io/posts/hevd-2/
๐Ÿ”นPart 4: https://mdanilor.github.io/posts/hevd-3/
๐Ÿ”นPart 5: https://mdanilor.github.io/posts/hevd-4/

๐Ÿ”–#infosec #cybersecurity #hacking #pentesting #security

[Cracking Windows Kernel with HEVD] Chapter 0: Where do I start?

A beginers guide into a Windows kernel stack overflow vulnerability from zero to advanced bypasses.

With macros off the table seemingly for good, more work is going to go into PDF exploitation again. You need to ensure that you are properly instrumented for catching child process events to Acrobat as well as app crash events, which are much more rare as regular faults than they used to be.

https://hacksys.io/blogs/adobe-reader-resetform-cagg-rce-cve-2023-21608

HackSys Inc
The highly popular "Windows Kernel Exploitation - Foundation and Advanced" course from Ashfaq Ansari returns to Ringzer0 this July with 32 hours of virtual training. Early bird pricing in effect till May 7: https://buff.ly/43Jqc7o
Windows Kernel Exploitation - Foundation and Advanced

Join Ashfaq Ansari for 32 hours of deep dive into the Windows Kernel and Internals. July 20th - 26th.

Ringzer0

Exciting news! ๐Ÿš€ Our comprehensive Windows Kernel Exploitation Foundation and Advanced class will be conducted @_ringzer0! This intensive course combines the essentials of both Foundation and Advanced levels, guiding you through the process of kernel exploitation. From exploiting bugs in Windows kernel mode drivers to bypassing advanced exploit mitigations, gain hands-on experience in a wide range of critical topics. ๐Ÿ› ๏ธ๐Ÿ–ฅ๏ธ

๐Ÿ“… Week 1: Feb 10-17, 2024
๐Ÿ“ Virtual Training
๐Ÿ•’ 32 CPE Hours

Key Learning Objectives:

* Understand Windows kernel debugging and internals
* Master exploit development techniques in kernel mode
* Bypass advanced exploit mitigations like kASLR, SMEP, and KPTI/KVA Shadow
* Develop Arbitrary Read/Write primitives

Who should attend?

* InfoSec professionals
* Bug hunters & Red teamers
* Windows exploit & driver developers
* Ethical hackers looking to upgrade to kernel level

๐ŸŒŸ Course culminates in a CTF challenge where you can apply your newly acquired skills!

https://ringzer0.training/trainings/windows-kernel-exploitation.html

#WKE #WindowsKernel #Exploitation #Training #ring0 #InfoSec #CyberSecurity #KernelExploitation

Ringzer0 - Windows Kernel Exploitation - Foundation and Advanced

Participants will gain hands-on experience in a wide range of topics, including Windows and driver internals, various memory corruption types, exploit development techniques, mitigation bypass techniques, pool internals, and Feng-Shui. The course culminates in a CTF challenge, allowing participants to apply their newly acquired skills.

CanSecWest 2023 is buzzing with excitement and energy! The venue is completely packed!
Introduction ยท Android Kernel Exploitation

The vulnerability game never stops, and we've got a new one to share! Read all about the Adobe Acrobat Reader resetForm CAgg UaF RCE exploit in our latest blogpost. Suggestions are most welcome.

https://hacksys.io/blogs/adobe-reader-resetform-cagg-rce-cve-2023-21608

HackSys Inc
Just published an advisory for Adobe Acrobat Reader Use-After-Free vulnerability leading to RCE. Check it out at https://hacksys.io/advisories/HI-2022-006

HackSys Inc
Adobe patched one of the RCE we reported as CVE-2023-21608 https://helpx.adobe.com/security/products/acrobat/apsb23-01.html