Unlimited WordPress themes, plugins & video downloads!

Research

Research – GDT And LDT In Windows Kernel Vulnerability Exploitation

Get the Whitepaper called GDT and LDT in Windows kernel vulnerability exploit. This paper discusses using 1 or 4 byte write-what-where conditions to convert a custom Data-Segment Descriptor entry in LDT of a process into a Call-Gate (with DPL set to 3 and RPL to 0).

 

You can download it from the following link: https://packetstormsecurity.com/files/download/85297/call_gate_exploitation.pdf

Source: https://packetstormsecurity.com/files/85297/GDT-And-LDT-In-Windows-Kernel-Vulnerability-Exploitation.html

Related posts
Research

Research - EUSecWest 2010 Call For Papers

Research

Research - ewdd.pdf

Research

Research - exploit.txt

Research

Research - Exploiting DLLs: A Guide To DLL Hijacking

Sign up for our Newsletter and
stay informed