Kernel Exploitation (3)

Latest Articles

privilege escalation shellcode

Monday, 13 July 2015 00:00 Written by
Privilege escalation shellcode The shellcodes of a kernel exploit and a user-land exploit are different in nature. The former is used for privilege escalation while the latter probably just steal the execution flow to his or her advantage. Remote kernel exploit shellcode share the characteristics of both world i.e. they…

X86 useful Assembly instructions and registers for hacking

Monday, 13 July 2015 00:00 Written by
X86 useful Assembly instructions and registers for hacking We can say x86 is the most common architecture among users. For hacking and exploitation, there is lots of juicy information that can be found just by reading registers. Also from an exploit writer point of view, there are interesting instructions in…

Popular Articles

X86 useful Assembly instructions and registers for hacking We can…
Privilege escalation shellcode The shellcodes of a kernel exploit and…
kernel exploit Vs user land exploitation Kernel exploits are used…
Advanced Programming Concepts
News Letter

Subscribe our Email News Letter to get Instant Update at anytime