| |||||
| |||||
Search Irongeek.com:
Help Irongeek.com pay for bandwidth and research equipment: |
This talk will have two primary focus points with the goal of providing useful
information for both penetration testers as well as vulnerability developers
looking to get into windows kernel exploitation. Attendees will leave with an
understanding of common kernel exploit techniques.
The first half will be an overview of Windows kernel vulnerabilities with a
focus on exploitability. The talk will explore the common classes of
vulnerabilities and reveal what they mean from an exploitability perspective.
The factors that make some vulnerabilities easier and more reliable to exploit
than others will be revealed.
The second half of the talk will contain techniques useful for creating
(semi-)reliable exploits. Techniques that will be covered include gaining code
execution, and notes for implementing exploits for the Metasploit framework. As a member of the Research and Innovation team, Spencer McIntyre works to discover vulnerabilities within organizations systems and understand underlying risks. Mr. McIntyre balances his focus between vulnerability and in-house tool development. During his time with SecureState, Mr. McIntyre has worked with a variety of clients across multiple industries, giving him experience in how each secures their data and the threats that they encounter. Mr. McIntyre uses his background in software development to help him to understand and exploit the underlying logic in the software he encounters. He is active in the open source community, making multiple contributions to a variety of projects such as the Metasploit Framework and Scapy.
15 most recent posts on Irongeek.com:
|
If you would like to republish one of the articles from this site on your
webpage or print journal please contact IronGeek.
Copyright 2020, IronGeek
Louisville / Kentuckiana Information Security Enthusiast