News

IOCTL++ tool for hunting Windows Kernel Exploits

IOCTL++ tool for hunting Windows Kernel Exploits

Juan Sacco

IOCTL++ can be used to make DeviceIoControl requests with arbitrary inputs. The original tool has been improved with a driver helper and a driver hooker allowing the user to capture...

IOCTL++ tool for hunting Windows Kernel Exploits

Juan Sacco

IOCTL++ can be used to make DeviceIoControl requests with arbitrary inputs. The original tool has been improved with a driver helper and a driver hooker allowing the user to capture...

Windows Kernel Exploits: WRMSR (Model Specific Registers)

Windows Kernel Exploits: WRMSR (Model Specific ...

Juan Sacco

Model Specific Registers (MSR) are CPU control registers that are specific for a CPU family. Their original purpose was to introduce experimental new features and functionality, but some of them...

Windows Kernel Exploits: WRMSR (Model Specific ...

Juan Sacco

Model Specific Registers (MSR) are CPU control registers that are specific for a CPU family. Their original purpose was to introduce experimental new features and functionality, but some of them...

Windows Kernel Exploits: ZwMapViewOfSection and ZwUnMapViewOfSection

Windows Kernel Exploits: ZwMapViewOfSection and...

Juan Sacco

In this exploit, the core technique here was hijacking a legitimate syscall (NtShutdownSystem) to act as a gate into arbitrary kernel exports. First, resolved the virtual address of a target...

Windows Kernel Exploits: ZwMapViewOfSection and...

Juan Sacco

In this exploit, the core technique here was hijacking a legitimate syscall (NtShutdownSystem) to act as a gate into arbitrary kernel exports. First, resolved the virtual address of a target...