Star 0

Abstract


Nikita Tarakanov is an independent information security researcher who has worked as an IS researcher in Positive Technologies, VUPEN Security and CISS. He likes writing exploits, especially for Windows NT Kernel and won the PHDays Hack2Own contest in 2011 and 2012. He has published a few papers about kernel mode drivers and their exploitation and is currently engaged in reverse engineering research and vulnerability search automation.

[Abstract] This topic covers exploitation tricks to exploit vulnerabilities in Windows kernel when attackers are in hard situations, for example when attackers have tiny or no control of values that overwrite memory.

Slides