Kernel Exploitation-Part 3

Over the last two articles of this series, we have come a long way around kernel exploitation. We started with finding a buffer overflow in driver code to parsing of different structures to steal the…

Go on to the site to read the full article

*** This is a Security Bloggers Network syndicated blog from InfoSec Resources authored by LM Security. Read the original post at: http://feedproxy.google.com/~r/infosecResources/~3/CzNvJ5iKVl0/