Tips on designing boot2root challenges
Tips on how to create and properly configure/test an intentionally vulnerable VM, also known as boot2roots.
[Kernel Exploitation] 7: Arbitrary Overwrite (Win7 x86)
This post discusses what an arbitrary overwrite (or write-what-where) vulnerability is and how it can be exploited.
[Kernel Exploitation] 6: NULL pointer dereference
Null page dereference vulnerabilities, what they are, how to exploit them and how they're mitigated.
[Kernel Exploitation] 5: Integer Overflow
Part 5 discusses a common vulnerability class called integer overflow.
[Kernel Exploitation] 4: Stack Buffer Overflow (SMEP Bypass)
Building up on part 3, this post shows how exploitation is done on a Windows 10 machine with SMEP enabled.
[Kernel Exploitation] 3: Stack Buffer Overflow (Windows 7 x86/x64)
Demonstrates the exploit development phases of a stack buffer overflow in kernel on Windows 7 x86 and x64
[Kernel Exploitation] 2: Payloads
Discusses payloads to be used in upcoming posts
[Kernel Exploitation] 1: Setting up the environment
Discusses configuring the target VMs, loading the vulnerable driver and configuring WinDBG.
[DefCamp CTF Qualification 2017] Don't net, kids! (Revexp 400)
Writeup for Don't net, kids!
[DefCamp CTF Qualification 2017] Buggy Bot (Misc 400)
Writeup for Buggy Bot!