HAVOK
March 5th, 2005, 11:12
Hi everybody,
The article below explains a few things about ring0 that are useful for coding exploits, for example:
Finding the image base of ntoskrnl.
Enumerating processes -> threads.
Running user-level code from ring0 (this was discussed in this forums).
I think it is an interesting reading:
http://www.eeye.com/html/research/whitepapers/index.html
"remote windows kernel exploitation -step into the ring 0 (pdf)"
Regards,
Havok.
The article below explains a few things about ring0 that are useful for coding exploits, for example:
Finding the image base of ntoskrnl.
Enumerating processes -> threads.
Running user-level code from ring0 (this was discussed in this forums).
I think it is an interesting reading:
http://www.eeye.com/html/research/whitepapers/index.html
"remote windows kernel exploitation -step into the ring 0 (pdf)"
Regards,
Havok.