-
Recent Posts
Recent Comments
注入资源汇总PE注入,DLL注入,代码注… on Fault Injection on Linux: Prac… BertoldVdb on Reversing the Balong M3/MCU Co… Norman on Writeups – LowDeep, Kabo… ByamBa Sumiya on Writeups – LowDeep, Kabo… Pasquale on EM Fault Injection on a Budget… Archives
- November 2020
- September 2020
- August 2020
- June 2020
- May 2020
- March 2020
- February 2020
- January 2020
- December 2019
- November 2019
- October 2019
- September 2019
- August 2019
- July 2019
- June 2019
- May 2019
- October 2018
- August 2018
- July 2018
- June 2018
- May 2018
- April 2018
- March 2018
- February 2018
- January 2018
- December 2017
- November 2017
- October 2017
- September 2017
- August 2017
- July 2017
- June 2017
- May 2017
- April 2017
- March 2017
- February 2017
- January 2017
- December 2016
- November 2016
- October 2016
- September 2016
- August 2016
- July 2016
- June 2016
- May 2016
- April 2016
- March 2016
- September 2015
- June 2015
- April 2015
- December 2014
- November 2014
- September 2014
- August 2014
- July 2014
Categories
Meta
Monthly Archives: May 2017
Windows 7 x64 Kernel Exploitation – Stack Overflow (3/3)
In this (short) post, we will explore triggering a stack overflow vulnerability in the kernel. This is a classic exploitation case. The Vulnerability: TriggerStackOverflow Similar to the last post, we first inspect the vulnerable function in code. This is a … Continue reading →
Windows 7 x64 Kernel Exploitation – Arbitrary Write (2/3)
In this post, we will dive into an actual example of exploitation, against an arbitrary write-what-where vulnerability. The Vulnerability: TriggerArbitraryOverwrite The vulnerability we are exploiting is within the TriggerArbitraryOverwrite function. In source code, we can see this in the “TriggerArbitraryOverwrite” function, … Continue reading →
Windows 7 x64 Kernel Exploitation – Setup (1/3)
Several months ago, I took a short sojourn into the world of Windows Kernel exploitation, based on the work of hacksysteam and their excellent HackSys Extreme Vulnerable Driver (github here). I learned some things, and built a short community presentation … Continue reading →
HG658 for Fun and Profit (AES Remix)
Recently, I took a look at a Huawei HG658 router for fun – this is a router common to multiple ISP’s across Australia, so a solid vulnerability in this would be significantly re-usable. The router I had in question was … Continue reading →