際際滷shows by User: xort / http://www.slideshare.net/images/logo.gif 際際滷shows by User: xort / Wed, 12 Jul 2023 21:05:23 GMT 際際滷Share feed for 際際滷shows by User: xort 0x003 - Exploiting LOLDrivers - Physical Memory Mayhem /slideshow/0x003-exploiting-loldrivers-physical-memory-mayhem/259167836 0x003-exploitingloldrivers-physicalmemorymayhem-230712210523-406e729d
A look into exploiting LOLDriver vulnerabilities and adapting techniques utilized by unsigned driver loaders coming from the gaming community to create a new class of LOLDriver exploitation not currently seen in the penetration testing / red teaming communities.]]>

A look into exploiting LOLDriver vulnerabilities and adapting techniques utilized by unsigned driver loaders coming from the gaming community to create a new class of LOLDriver exploitation not currently seen in the penetration testing / red teaming communities.]]>
Wed, 12 Jul 2023 21:05:23 GMT /slideshow/0x003-exploiting-loldrivers-physical-memory-mayhem/259167836 xort@slideshare.net(xort) 0x003 - Exploiting LOLDrivers - Physical Memory Mayhem xort A look into exploiting LOLDriver vulnerabilities and adapting techniques utilized by unsigned driver loaders coming from the gaming community to create a new class of LOLDriver exploitation not currently seen in the penetration testing / red teaming communities. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/0x003-exploitingloldrivers-physicalmemorymayhem-230712210523-406e729d-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> A look into exploiting LOLDriver vulnerabilities and adapting techniques utilized by unsigned driver loaders coming from the gaming community to create a new class of LOLDriver exploitation not currently seen in the penetration testing / red teaming communities.
0x003 - Exploiting LOLDrivers - Physical Memory Mayhem from Russell Sanford
]]>
1294 0 https://cdn.slidesharecdn.com/ss_thumbnails/0x003-exploitingloldrivers-physicalmemorymayhem-230712210523-406e729d-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
0x002 - Windows Priv Esc - A Low Level Explanation of Token Theft /slideshow/0x002-windows-priv-esc-a-low-level-explanation-of-token-theft/259071925 0x002-windowsprivesc-alowlevelexplanationoftokentheft-230709013643-2448d219
A low level walkthrough of exploiting creation utilizing Token Theft Privilege Esc techniques by utilizing WRITE-WHAT-WHERE/READ-WHAT-WHERE exploit primitives (Including Demo Vulnerable Driver and Userland Exploit Tools)]]>

A low level walkthrough of exploiting creation utilizing Token Theft Privilege Esc techniques by utilizing WRITE-WHAT-WHERE/READ-WHAT-WHERE exploit primitives (Including Demo Vulnerable Driver and Userland Exploit Tools)]]>
Sun, 09 Jul 2023 01:36:43 GMT /slideshow/0x002-windows-priv-esc-a-low-level-explanation-of-token-theft/259071925 xort@slideshare.net(xort) 0x002 - Windows Priv Esc - A Low Level Explanation of Token Theft xort A low level walkthrough of exploiting creation utilizing Token Theft Privilege Esc techniques by utilizing WRITE-WHAT-WHERE/READ-WHAT-WHERE exploit primitives (Including Demo Vulnerable Driver and Userland Exploit Tools) <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/0x002-windowsprivesc-alowlevelexplanationoftokentheft-230709013643-2448d219-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> A low level walkthrough of exploiting creation utilizing Token Theft Privilege Esc techniques by utilizing WRITE-WHAT-WHERE/READ-WHAT-WHERE exploit primitives (Including Demo Vulnerable Driver and Userland Exploit Tools)
0x002 - Windows Priv Esc - A Low Level Explanation of Token Theft from Russell Sanford
]]>
201 0 https://cdn.slidesharecdn.com/ss_thumbnails/0x002-windowsprivesc-alowlevelexplanationoftokentheft-230709013643-2448d219-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
0x02 - Windows Privilege Esc - A Low Level Explanation of Token Theft /slideshow/0x02-windows-privilege-esc-a-low-level-explanation-of-token-theft/258747067 0x02-windowsprivilegeesc-alowlevelexplanationoftokentheft-230630222050-1a7e88a5
A Low Level Explanation of How Windows Token Theft is Used For Privilege Esc (with a demo vuln driver and exploitation tools)]]>

A Low Level Explanation of How Windows Token Theft is Used For Privilege Esc (with a demo vuln driver and exploitation tools)]]>
Fri, 30 Jun 2023 22:20:49 GMT /slideshow/0x02-windows-privilege-esc-a-low-level-explanation-of-token-theft/258747067 xort@slideshare.net(xort) 0x02 - Windows Privilege Esc - A Low Level Explanation of Token Theft xort A Low Level Explanation of How Windows Token Theft is Used For Privilege Esc (with a demo vuln driver and exploitation tools) <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/0x02-windowsprivilegeesc-alowlevelexplanationoftokentheft-230630222050-1a7e88a5-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> A Low Level Explanation of How Windows Token Theft is Used For Privilege Esc (with a demo vuln driver and exploitation tools)
0x02 - Windows Privilege Esc - A Low Level Explanation of Token Theft from Russell Sanford
]]>
106 0 https://cdn.slidesharecdn.com/ss_thumbnails/0x02-windowsprivilegeesc-alowlevelexplanationoftokentheft-230630222050-1a7e88a5-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
0x01 - Breaking into Linux VMs for Fun and Profit /slideshow/0x01-breaking-into-linux-vms-for-fun-and-profit/258310708 0x01-breakingintolinuxvmsforfunandprofit-230608131927-2dd9cda8
This presentation focuses on an attack technique I developed to utilize OS debugging functionality provided by VMWare to compromise Linux Virtual Machines]]>

This presentation focuses on an attack technique I developed to utilize OS debugging functionality provided by VMWare to compromise Linux Virtual Machines]]>
Thu, 08 Jun 2023 13:19:27 GMT /slideshow/0x01-breaking-into-linux-vms-for-fun-and-profit/258310708 xort@slideshare.net(xort) 0x01 - Breaking into Linux VMs for Fun and Profit xort This presentation focuses on an attack technique I developed to utilize OS debugging functionality provided by VMWare to compromise Linux Virtual Machines <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/0x01-breakingintolinuxvmsforfunandprofit-230608131927-2dd9cda8-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> This presentation focuses on an attack technique I developed to utilize OS debugging functionality provided by VMWare to compromise Linux Virtual Machines
0x01 - Breaking into Linux VMs for Fun and Profit from Russell Sanford
]]>
80 0 https://cdn.slidesharecdn.com/ss_thumbnails/0x01-breakingintolinuxvmsforfunandprofit-230608131927-2dd9cda8-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
writing self-modifying code and utilizing advanced assembly techniques /slideshow/writing-selfmodifying-code-and-utilizing-advanced-assembly-techniques/249426092 13127-writing-self-modifying-code-andutilizing-advanced-assembly-techniques-210620211413
writing self-modifying code and utilizing advanced assembly techniques]]>

writing self-modifying code and utilizing advanced assembly techniques]]>
Sun, 20 Jun 2021 21:14:13 GMT /slideshow/writing-selfmodifying-code-and-utilizing-advanced-assembly-techniques/249426092 xort@slideshare.net(xort) writing self-modifying code and utilizing advanced assembly techniques xort writing self-modifying code and utilizing advanced assembly techniques <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/13127-writing-self-modifying-code-andutilizing-advanced-assembly-techniques-210620211413-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> writing self-modifying code and utilizing advanced assembly techniques
writing self-modifying code and utilizing advanced assembly techniques from Russell Sanford
]]>
155 0 https://cdn.slidesharecdn.com/ss_thumbnails/13127-writing-self-modifying-code-andutilizing-advanced-assembly-techniques-210620211413-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Bug Hunting with Media Formats /xort/bug-hunting-with-media-formats bs-dc214-bughuntingwithmediaformats-161006115141
This presentation explores the makeup of several common file formats, discusses common vulnerabilities associated with media formats, and details auditing for bugs stemming from improper handling of media files.]]>

This presentation explores the makeup of several common file formats, discusses common vulnerabilities associated with media formats, and details auditing for bugs stemming from improper handling of media files.]]>
Thu, 06 Oct 2016 11:51:40 GMT /xort/bug-hunting-with-media-formats xort@slideshare.net(xort) Bug Hunting with Media Formats xort This presentation explores the makeup of several common file formats, discusses common vulnerabilities associated with media formats, and details auditing for bugs stemming from improper handling of media files. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/bs-dc214-bughuntingwithmediaformats-161006115141-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> This presentation explores the makeup of several common file formats, discusses common vulnerabilities associated with media formats, and details auditing for bugs stemming from improper handling of media files.
Bug Hunting with Media Formats from Russell Sanford
]]>
210 2 https://cdn.slidesharecdn.com/ss_thumbnails/bs-dc214-bughuntingwithmediaformats-161006115141-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Compromising Linux Virtual Machines with Debugging Mechanisms /slideshow/compromising-linux-virtual-machines-with-debugging-mechanisms/66806225 compromisinglinuxvmswithdebuggingmechanismsoct162016-161006114812
This presentation covers utilizing VMwares (GDB) debugging protocol to invasive inject commands into a Linux-x64 target. Automatic detection of kernel API is performed to locate _vmalloc & call_usermodehelper* functions across all 3x and 4x kernels.]]>

This presentation covers utilizing VMwares (GDB) debugging protocol to invasive inject commands into a Linux-x64 target. Automatic detection of kernel API is performed to locate _vmalloc & call_usermodehelper* functions across all 3x and 4x kernels.]]>
Thu, 06 Oct 2016 11:48:12 GMT /slideshow/compromising-linux-virtual-machines-with-debugging-mechanisms/66806225 xort@slideshare.net(xort) Compromising Linux Virtual Machines with Debugging Mechanisms xort This presentation covers utilizing VMwares (GDB) debugging protocol to invasive inject commands into a Linux-x64 target. Automatic detection of kernel API is performed to locate _vmalloc & call_usermodehelper* functions across all 3x and 4x kernels. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/compromisinglinuxvmswithdebuggingmechanismsoct162016-161006114812-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> This presentation covers utilizing VMwares (GDB) debugging protocol to invasive inject commands into a Linux-x64 target. Automatic detection of kernel API is performed to locate _vmalloc &amp; call_usermodehelper* functions across all 3x and 4x kernels.
Compromising Linux Virtual Machines with Debugging Mechanisms from Russell Sanford
]]>
861 2 https://cdn.slidesharecdn.com/ss_thumbnails/compromisinglinuxvmswithdebuggingmechanismsoct162016-161006114812-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
https://public.slidesharecdn.com/v2/images/profile-picture.png ./ https://cdn.slidesharecdn.com/ss_thumbnails/0x003-exploitingloldrivers-physicalmemorymayhem-230712210523-406e729d-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/0x003-exploiting-loldrivers-physical-memory-mayhem/259167836 0x003 - Exploiting LOL... https://cdn.slidesharecdn.com/ss_thumbnails/0x002-windowsprivesc-alowlevelexplanationoftokentheft-230709013643-2448d219-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/0x002-windows-priv-esc-a-low-level-explanation-of-token-theft/259071925 0x002 - Windows Priv E... https://cdn.slidesharecdn.com/ss_thumbnails/0x02-windowsprivilegeesc-alowlevelexplanationoftokentheft-230630222050-1a7e88a5-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/0x02-windows-privilege-esc-a-low-level-explanation-of-token-theft/258747067 0x02 - Windows Privile...