From Ring Zero to UID Zero

A couple of stories about kernel exploiting

sgrakkyu and twiz

The process of exploiting kernel based vulnerabilities is one of the topics which have received more attention (and kindled more interest) among security researchers, coders and addicted.

Related

Download

Embed

Share:

Tags