conference logo

Playlist "24C3: Volldampf voraus!"

From Ring Zero to UID Zero

sgrakkyu and twiz

The process of exploiting kernel based vulnerabilities is one of the topics which have received more attention (and kindled more interest) among security researchers, coders and addicted.