The document discusses the exploitation of Windows drivers known as 'loldrivers' and their use in cyberattacks via a method called 'living off the land' (LOTL). It outlines the background of loldriver exploitation, provides details on setting up development environments, and explains communication between userland and kernel land, emphasizing Ioctl calls and vulnerable APIs for accessing physical memory. The document also lists common tools and techniques for exploiting these vulnerabilities,...| SlideShare
SUMMARY| talosintelligence.com
SUMMARY| talosintelligence.com
In recent years, Microsoft has focused its efforts on mitigating bug classes and exploitation techniques. In latest Windows versions this includes another change that adds a significant challenge to attackers targeting the Windows kernel — restricting kernel address leaks to user mode. With almost any memory bugs, an attacker needs some kernel address leak to know which address will be read / written into / overflowed / corrupted. That address could be the address of ntoskrnl.exe or other k...| Winsider Seminars & Solutions Inc.