Windows Kernel Exploitation null Pune Humla 10 June 2017 Windows Kernel Exploitation
Abstract
Overview
We are conducting
n|u Humla
session atPune
onWindows Kernel Exploitation
. This will be a hands-on session where attendees will be introduced to Windows Kernel exploitation techniques. We invite people who know basics of user mode exploitation and are really interested in upgrading their skills to attack and exploit Windows Kernel. This is a per-invite based session and will be sending out the invites to only 10 people.Prerequisites (Basics)
- User Mode Exploitation
- Assembly and C/Python
- WinDbg
- Memory Corruption Classes
Hardware & Software Requirement
- A laptop capable of running two virtual machines simultaneously (4/8 GB of RAM).
- 8/16 GB Flash Drive
Note: The VM setup instructions will be mailed later to the selected attendees.
What to Expect?
- Hands-on
- Fast & Quick Overview of Windows Internals
- WinDbg-Fu
- Windows Kernel Drivers Basics/IOCTL/IRP
- Techniques to Exploit Windows Kernel/Driver Vulnerabilities
What Not to Expect?
- Elite Kernel Hacker in One day
- Basics of ASM/C/Python
- Basics of User Mode Exploitation
Note: This session is conducted to introduce Windows Kernel Exploitation concepts to attendees and walk-through/hands-on to help gain confidence in Kernel Exploitation. This is just a
TIP
of anICEBERG
.
Speaker
Ashfaq Ansari is the founder of HackSys Team code named "Panthera". He is a Security Researcher with experience in various aspects of Information Security. He has authored "HackSys Extreme Vulnerable Driver" and "Shellcode of Death". He has also written and published various whitepapers on low level software exploitation. His core interest lies in "Low Level Exploitation", "Reverse Engineering", "Program Analysis" and "Hybrid Fuzzing". He is a fanboy of Artificial Intelligence and Machine Learning. He is the chapter lead for null (Pune).
Timing
Starts at Saturday June 10 2017, 10:00 AM. The sessions runs for about 9 hours.