๐ ๏ธNice introduction to Windows kernel exploitation for beginners
๐นPart 1: https://mdanilor.github.io/posts/hevd-0/
๐นPart 2: https://mdanilor.github.io/posts/hevd-1/
๐นPart 3: https://mdanilor.github.io/posts/hevd-2/
๐นPart 4: https://mdanilor.github.io/posts/hevd-3/
๐นPart 5: https://mdanilor.github.io/posts/hevd-4/
With macros off the table seemingly for good, more work is going to go into PDF exploitation again. You need to ensure that you are properly instrumented for catching child process events to Acrobat as well as app crash events, which are much more rare as regular faults than they used to be.
https://hacksys.io/blogs/adobe-reader-resetform-cagg-rce-cve-2023-21608
Exciting news! ๐ Our comprehensive Windows Kernel Exploitation Foundation and Advanced class will be conducted @_ringzer0! This intensive course combines the essentials of both Foundation and Advanced levels, guiding you through the process of kernel exploitation. From exploiting bugs in Windows kernel mode drivers to bypassing advanced exploit mitigations, gain hands-on experience in a wide range of critical topics. ๐ ๏ธ๐ฅ๏ธ
๐
Week 1: Feb 10-17, 2024
๐ Virtual Training
๐ 32 CPE Hours
Key Learning Objectives:
* Understand Windows kernel debugging and internals
* Master exploit development techniques in kernel mode
* Bypass advanced exploit mitigations like kASLR, SMEP, and KPTI/KVA Shadow
* Develop Arbitrary Read/Write primitives
Who should attend?
* InfoSec professionals
* Bug hunters & Red teamers
* Windows exploit & driver developers
* Ethical hackers looking to upgrade to kernel level
๐ Course culminates in a CTF challenge where you can apply your newly acquired skills!
https://ringzer0.training/trainings/windows-kernel-exploitation.html
#WKE #WindowsKernel #Exploitation #Training #ring0 #InfoSec #CyberSecurity #KernelExploitation
Participants will gain hands-on experience in a wide range of topics, including Windows and driver internals, various memory corruption types, exploit development techniques, mitigation bypass techniques, pool internals, and Feng-Shui. The course culminates in a CTF challenge, allowing participants to apply their newly acquired skills.
RT @0xor0ne
Cool guide to Android vulnerability analysis and exploitation by @hacksysteam
The vulnerability game never stops, and we've got a new one to share! Read all about the Adobe Acrobat Reader resetForm CAgg UaF RCE exploit in our latest blogpost. Suggestions are most welcome.
https://hacksys.io/blogs/adobe-reader-resetform-cagg-rce-cve-2023-21608