[Video] Juan Sacco, founder of Exploit Pack at No Hat conference (Italy)
Share
Juan Sacco from Exploit Pack delivered a focused, hands-on workshop titled “Subverting the Windows Kernel with rootkits and exploits” at No Hat in Italy.
The workshop focused on three primary exploit classes:
-
Physical memory primitives
-
WRMSR / RDMSR primitives
- Overflows (Stack and Heap)
The attendants explored a collection of the tools that Juan has developed for Windows Kernel Exploitation, following along with the practical part of the workshop. Laptops with VM and Ghidra installed were ready to follow along!
The workshop was fast-paced and very hands-on, so attendees were advised to expect a few blue screens, learn new techniques, and walk away with new ideas for their next Windows kernel exploit.
Juan’s session reinforced our commitment to deep, practice-driven research. If you’re interested in the kinds of techniques covered. We have more in-depth and self-paced training available:
Vulnerability Hunting for the Windows Kernel
Watch the video - “Subverting the Windows Kernel with rootkits and exploits”