From Ring Zero to UID Zero

A couple of stories about kernel exploiting

sgrakkyu and twiz

Playlists: '24c3' videos starting here / related events

The process of exploiting kernel based vulnerabilities is one of the topics which have received more attention (and kindled more interest) among security researchers, coders and addicted.

Download

Related

Embed

Share:

Tags