Kernel Exploitation-Part 2

In Part-1 of this article series, we had reverse engineered the driver and identified buffer overflow vulnerability in it. In this part, we will cover the next step of developing the exploit, and for…

Go on to the site to read the full article

*** This is a Security Bloggers Network syndicated blog from InfoSec Resources authored by LM Security. Read the original post at: http://feedproxy.google.com/~r/infosecResources/~3/vznG60a9fuk/