Roast topics
Find topics
Roast it!
Roast topics
Find topics
Find it!
Login
From:
Connor McGarr’s Blog
(Uncensored)
subscribe
Exploit Development: Swimming In The (Kernel) Pool - Leveraging Pool Vulnerabilities From Low-Integrity Exploits, Part 2
https://connormcgarr.github.io/swimming-in-the-kernel-pool-part-2/
links
backlinks
Tagged with:
posts
Combining part 1's information leak vulnerability with a pool overflow vulnerability to obtain code execution via grooming the kLFH