layout | title |
---|---|
page |
Tutorials |
N-part series on kernel exploitation in Windows environment demonstrating the exploit development phases, relevant mitigations and how they're bypassed.
- Part 1: [Setting up the environment]({{ "/2018/01/kernel-exploitation-1" | absolute_url }})
- Part 2: [Payloads]({{ "/2018/01/kernel-exploitation-2" | absolute_url }})
- Part 3: [Stack Buffer Overflow (Windows 7 x86/x64)]({{ "/2018/01/kernel-exploitation-3" | absolute_url }})
- Part 4: [Stack Buffer Overflow (SMEP Bypass)]({{ "/2018/01/kernel-exploitation-4" | absolute_url }})
- Part 5: [Integer Overflow]({{ "/2018/01/kernel-exploitation-5" | absolute_url }})
- Part 6: [NULL pointer dereference]({{ "/2018/01/kernel-exploitation-6" | absolute_url }})
- Part 7: [Arbitrary Overwrite on Windows 7 x86]({{ "/2018/01/kernel-exploitation-7" | absolute_url }})
- Part 8: Arbitrary Overwrite on Windows 10 (TBD)
- [Vulnix]({{ "/2016/10/walkthrough-vulnix-vulnhub-vm" | absolute_url }})
- [PwnLab: init]({{ "/2016/11/pwnlab-init-walkthrough-vulnhub" | absolute_url }})
- [Kioptrix 1]({{ "/2016/11/kioptrix-1-walkthrough-vulnhub" | absolute_url }})
- [Kioptrix 2]({{ "/2016/12/kioptrix-2-walkthrough-vulnhub" | absolute_url }})
- [Kioptrix 3]({{ "/2016/12/kioptrix-3-walkthrough-vulnhub" | absolute_url }})
- [Kioptrix 1.3 (#4)]({{ "/2016/12/kioptrix-level-13-4-walkthrough-vulnhub" | absolute_url }})
- [Kioptrix 2014 (#5)]({{ "/2017/01/kioptrix-2014-5-walkthrough-vulnhub" | absolute_url }})
- [Mr Robot]({{ "/2017/02/mr-robot-1-walkthrough-vulnhub" | absolute_url }})
- [LTR Scene 1]({{ "/2017/03/21ltr-scene-1-walkthrough-vulnhub" | absolute_url }})
- [Wallaby's Nightmare]({{ "/2017/01/wallabys-nightmare-walkthrough-vulnhub" | absolute_url }})