Link | Title |
---|---|
https://cansecwest.com/core05/windowsremotekernel.pdf | Remote Windows Kernel Exploitation |
Link | Title |
---|---|
http://uninformed.org/index.cgi?v=3&a=4&t=sumry | windows kernel-mode payload fundamentals |
Link | Title |
---|---|
http://www.uninformed.org/?v=6&a=2&t=sumry | exploiting 802.11 wireless driver vulnerabilities on windows |
Link | Title |
---|---|
https://blogs.technet.microsoft.com/srd/2008/10/14/ms08-061-the-case-of-the-kernel-mode-double-fetch/ | MS08-061 : The case of the kernel mode double-fetch |
Link | Title |
---|---|
https://blogs.technet.microsoft.com/srd/2009/05/26/safe-unlinking-in-the-kernel-pool/ | Safe Unlinking in the Kernel Pool |
Link | Title |
---|---|
http://magazine.hitb.org/issues/HITB-Ezine-Issue-002.pdf | (page 28) Windows Objects in Kernel Vulnerability Exploitation |
http://magazine.hitb.org/issues/HITB-Ezine-Issue-003.pdf | (pages 35 to 41) Reserve Objects in Windows 7 |
Link | Title |
---|---|
https://media.blackhat.com/bh-dc-11/Mandt/BlackHat_DC_2011_Mandt_kernelpool-wp.pdf | Kernel Pool Exploitation on Windows 7 |
http://j00ru.vexillium.org/?p=690 | Windows Kernel-mode GS Cookies and 1 bit of entropy |
http://j00ru.vexillium.org/?p=762 | Subtle information disclosure in WIN32K.SYS syscall return values |
http://j00ru.vexillium.org/?p=769 | nt!NtMapUserPhysicalPages and Kernel Stack-Spraying Techniques |
http://j00ru.vexillium.org/?p=783 | SMEP: What is it, and how to beat it on Windows |
http://www.mista.nu/research/mandt-win32k-paper.pdf | Kernel Attacks through User-Mode Callbacks |
http://j00ru.vexillium.org/blog/04_12_11/Windows_Kernel_Address_Protection.pdf | Windows Security Hardening Through Kernel Address Protection |
Link | Title |
---|---|
http://hitcon.org/2012/download/0720A5_360.MJ0011_Reversing%20Windows8-Interesting%20Features%20of%20Kernel%20Security.pdf | Reversing Windows8: Interesting Features of Kernel Security |
http://mista.nu/research/smashing_the_atom.pdf | Smashing The Atom: Extraordinary String Based Attacks |
http://media.blackhat.com/bh-us-12/Briefings/Cerrudo/BH_US_12_Cerrudo_Windows_Kernel_WP.pdf | Easy local Windows Kernel exploitation |
Link | Title |
---|---|
https://labs.mwrinfosecurity.com/blog/mwr-labs-pwn2own-2013-write-up-kernel-exploit/ | MWR Labs Pwn2Own 2013 Write-up - Kernel Exploit |
http://www.alex-ionescu.com/?p=82 | KASLR Bypass Mitigations in Windows 8.1 |
https://blogs.technet.microsoft.com/srd/2013/11/06/software-defense-safe-unlinking-and-reference-count-hardening/ | Software defense: safe unlinking and reference count hardening |
Link | Title |
---|---|
http://doar-e.github.io/blog/2014/03/11/first-dip-into-the-kernel-pool-ms10-058/ | First Dip Into the Kernel Pool: MS10-058 |
https://labs.mwrinfosecurity.com/blog/windows-8-kernel-memory-protections-bypass/ | Windows 8 Kernel Memory Protections Bypass |
http://blog.trendmicro.com/trendlabs-security-intelligence/an-analysis-of-a-windows-kernel-mode-vulnerability-cve-2014-4113/ | An Analysis of A Windows Kernel-Mode Vulnerability (CVE-2014-4113) |
http://www.alex-ionescu.com/?p=231 | Sheep Year Kernel Heap Fengshui: Spraying in the Big Kids’ Pool |
Link | Title |
---|---|
https://Fwww.nccgroup.trust/globalassets/newsroom/uk/blog/documents/2015/07/exploiting-cve-2015.pdf | Exploiting the win32k!xxxEnableWndSBArrows use-after-free (CVE 2015-0057) bug on both 32-bit and 64-bit |
https://www.nccgroup.trust/globalassets/our-research/uk/whitepapers/2015/08/2015-08-27_-_ncc_group_-_exploiting_ms15_061_uaf_-_release.pdf | Exploiting MS15-061 Microsoft Windows Kernel Use-After-Free (win32k!xxxSetClassLong) |
https://www.nccgroup.trust/globalassets/our-research/uk/whitepapers/2015/09/2015-08-28_-_ncc_group_-_exploiting_cve_2015_2426_-_release.pdf | Exploiting CVE-2015-2426, and How I Ported it to a Recent Windows 8.1 64-bit |
https://www.coresecurity.com/blog/abusing-gdi-for-ring0-exploit-primitives | Abusing GDI for ring0 exploit primitives |
https://www.virusbulletin.com/uploads/pdf/conference_slides/2015/OhFlorio-VB2015.pdf | Duqu 2.0 Win32k exploit analysis |
Link | Title |
---|---|
https://sww-it.ru/2018-01-29/1532 | Decrement Windows kernel for fun and profit |
https://blog.quarkslab.com/reverse-engineering-the-win32k-type-isolation-mitigation.html | Reverse Engineering the Win32k Type Isolation Mitigation |