A Logo

Feel free to include my content in your page via my
RSS feed

Help Irongeek.com pay for
bandwidth and research equipment:

Subscribestar or Patreon

Search Irongeek.com:

Affiliates:
Irongeek Button
Social-engineer-training Button

Help Irongeek.com pay for bandwidth and research equipment:

paypalpixle


Practical Windows Kernel Exploitation - Spencer McIntyre Derbycon 2015 (Hacking Illustrated Series InfoSec Tutorial Videos)

Practical Windows Kernel Exploitation
Spencer McIntyre
Derbycon 2015

This talk will have two primary focus points with the goal of providing useful information for both penetration testers as well as vulnerability developers looking to get into windows kernel exploitation. Attendees will leave with an understanding of common kernel exploit techniques. The first half will be an overview of Windows kernel vulnerabilities with a focus on exploitability. The talk will explore the common classes of vulnerabilities and reveal what they mean from an exploitability perspective. The factors that make some vulnerabilities easier and more reliable to exploit than others will be revealed. The second half of the talk will contain techniques useful for creating (semi-)reliable exploits. Techniques that will be covered include gaining code execution, and notes for implementing exploits for the Metasploit framework.

As a member of the Research and Innovation team, Spencer McIntyre works to discover vulnerabilities within organizations systems and understand underlying risks. Mr. McIntyre balances his focus between vulnerability and in-house tool development. During his time with SecureState, Mr. McIntyre has worked with a variety of clients across multiple industries, giving him experience in how each secures their data and the threats that they encounter. Mr. McIntyre uses his background in software development to help him to understand and exploit the underlying logic in the software he encounters. He is active in the open source community, making multiple contributions to a variety of projects such as the Metasploit Framework and Scapy.

@zeroSteiner

Back to Derbycon 2015 video list

Printable version of this article

15 most recent posts on Irongeek.com:


If you would like to republish one of the articles from this site on your webpage or print journal please contact IronGeek.

Copyright 2020, IronGeek
Louisville / Kentuckiana Information Security Enthusiast