<--- Back to Details
First PageDocument Content
Software bugs / Shellcode / Address space layout randomization / Kernel / Linux kernel / Architecture of Windows NT / Loadable kernel module / Integer overflow
Date: 2016-08-09 05:04:08
Software bugs
Shellcode
Address space layout randomization
Kernel
Linux kernel
Architecture of Windows NT
Loadable kernel module
Integer overflow

Exploitation techniques for NT kernel Adrien ‘Adr1’ Garin Introduction

Add to Reading List

Source URL: www.lse.epita.fr

Download Document from Source Website

File Size: 955,00 KB

Share Document on Facebook

Similar Documents

Network-Level Polymorphic Shellcode Detection Using Emulation Michalis Polychronakis1 , Kostas G. Anagnostakis2 , and Evangelos P. Markatos1 1 Institute of Computer Science, Foundation for Research & Technology – Hell

DocID: 1tgZi - View Document

ShellNoob Because writing shellcode is fun, but sometimes painful Black Hat USA Arsenal 2013

DocID: 1tfIa - View Document

http://www.nologin.org Understanding Windows Shellcode skape

DocID: 1temb - View Document

Look Mom, I don’t use Shellcode Browser Exploitation Case Study for Internet Explorer 11 Moritz Jodeit (@moritzj) Agenda

DocID: 1sSdc - View Document