This talk will have two primary focus points with the goal of providing useful information for both penetration testers as well as vulnerability developers looking to get into windows kernel exploitation. Attendees will leave with an understanding of common kernel exploit techniques. The first half will be an overview of Windows kernel vulnerabilities with a focus on exploitability. The talk will explore the common classes of vulnerabilities and reveal what they mean from an exploitability perspective. The factors that make some vulnerabilities easier and more reliable to exploit than others will be revealed. The second half of the talk will contain techniques useful for creating (semi-)reliable exploits. Techniques that will be covered include gaining code execution, and notes for implementing exploits for the Metasploit framework.
As a member of the Research and Innovation team, Spencer McIntyre works to discover vulnerabilities within organizations systems and understand underlying risks. Mr. McIntyre balances his focus between vulnerability and in-house tool development. During his time with SecureState, Mr. McIntyre has worked with a variety of clients across multiple industries, giving him experience in how each secures their data and the threats that they encounter. Mr. McIntyre uses his background in software development to help him to understand and exploit the underlying logic in the software he encounters. He is active in the open source community, making multiple contributions to a variety of projects such as the Metasploit Framework and Scapy.
If you would like to republish one of the articles from this site on your webpage or print journal please contact IronGeek.
Copyright 2020, IronGeek