|
You are here |
nixhacker.com | ||
| | | | |
mdanilor.github.io
|
|
| | | | | A beginers guide into a Windows kernel stack overflow vulnerability from zero to advanced bypasses. | |
| | | | |
prog.world
|
|
| | | | | [AI summary] The article discusses the use of Intel Processor Trace (PT) technology to capture code traces from the System Management Mode (SMM) in a computer's BIOS. The authors detail the process of creating a backdoor to access SMM, modifying the SMI dispatcher to redirect execution to a custom shellcode, and using tools like WinIPT and ptxed to analyze the trace data. They also mention challenges such as synchronization issues and the need for cross-platform compatibility, and conclude that this method provides an efficient way to investigate SMM code for vulnerabilities. | |
| | | | |
keenlab.tencent.com
|
|
| | | | | In the past two years, Keen Security Lab did in-depth research on the security of Tesla Cars and presented our research results on Black Hat 2017 and Black Hat 2018. Our research involves many in-veh | |
| | | | |
www.shogunlab.com
|
|
| | | Welcome to the second part in a tutorial series on reverse engineering Windows binaries with Ghidra! In this post, we'll be building on the concepts we learned in Part 0 and introduce some new topics | ||