conference logo

Playlist "From Ring Zero to UID Zero"

From Ring Zero to UID Zero

sgrakkyu and twiz

The process of exploiting kernel based vulnerabilities is one of the topics which have received more attention (and kindled more interest) among security researchers, coders and addicted.