<--- Back to Details
First PageDocument Content
Software bugs / Shellcode / Address space layout randomization / Kernel / Linux kernel / Architecture of Windows NT / Loadable kernel module / Integer overflow
Date: 2016-08-09 05:04:08
Software bugs
Shellcode
Address space layout randomization
Kernel
Linux kernel
Architecture of Windows NT
Loadable kernel module
Integer overflow

Exploitation techniques for NT kernel Adrien ‘Adr1’ Garin Introduction

Add to Reading List

Source URL: www.lse.epita.fr

Download Document from Source Website

File Size: 955,00 KB

Share Document on Facebook

Similar Documents

Upstreaming hardware support in the Linux kernel: why and how? Thomas Petazzoni - CTO Bootlin

Upstreaming hardware support in the Linux kernel: why and how? Thomas Petazzoni - CTO Bootlin

DocID: 1vmWS - View Document

The Implementation of Passive Covert Channels in the Linux Kernel Joanna Rutkowska joanna at invisiblethings.org Chaos Communication Congress December 2004

The Implementation of Passive Covert Channels in the Linux Kernel Joanna Rutkowska joanna at invisiblethings.org Chaos Communication Congress December 2004

DocID: 1uBfP - View Document

Differentiating Communication Styles of Leaders on the Linux Kernel Mailing List Daniel Schneider Scott Spurlock

Differentiating Communication Styles of Leaders on the Linux Kernel Mailing List Daniel Schneider Scott Spurlock

DocID: 1uxk9 - View Document

P4C-XDP:	Programming	the	Linux	 Kernel	Forwarding	Plane	using	P4 William	Tu,	VMware	NSBU Mihai	Budiu,	VMware	Research {mbudiu,tuc}@vmware.com June	5,	2018

P4C-XDP: Programming the Linux Kernel Forwarding Plane using P4 William Tu, VMware NSBU Mihai Budiu, VMware Research {mbudiu,tuc}@vmware.com June 5, 2018

DocID: 1uvHT - View Document

Copyright © 2009 Red Hat, Inc. “Red Hat,” Red Hat Linux, the Red Hat “Shadowman” logo, and the products listed are trademarks of Red Hat, Inc., registered in the U.S. and other countries. Linux® is the registe

DocID: 1uvk2 - View Document