Articles Blog | G5 Cyber Security

Research – GDT And LDT In Windows Kernel Vulnerability Exploitation

Get the Whitepaper called GDT and LDT in Windows kernel vulnerability exploit. This paper discusses using 1 or 4 byte write-what-where conditions to convert a custom Data-Segment Descriptor entry in LDT of a process into a Call-Gate (with DPL set to 3 and RPL to 0).

 

You can download it from the following link: https://packetstormsecurity.com/files/download/85297/call_gate_exploitation.pdf

Source: https://packetstormsecurity.com/files/85297/GDT-And-LDT-In-Windows-Kernel-Vulnerability-Exploitation.html

Exit mobile version