Intro

Living off the Kernel – Creating Weapons out of knowledge

So far, we have made it clear that the basic structures of the windows kernel, as undocumented as they are, can still be understood with some effort to connect all the pointers between the different objects.

Furthermore, we have made it clear that in order to navigate through the kernel, all we need to do is to combine our knowledge of the relationships between structs, and our ability to read/write the kernel memory.

With the said knowledge and basic navigation system, it is now time to weaponize what we know in order to create killer scenarios which will demonstrate just how explosive and dangerous exploitation of this vulnerability is.

Keep in mind, the POCs you are about to be introduced to, are not claiming to be all there is to it, rather then an extended view of how one can develop further exploits and malicious functionalities on top of our already existing knowledge. We are well aware that there is much more to be done.

Last updated