Windows Drivers Series Part 8 - Bypassing SMEP
Porting the HEVD buffer overflow exploit to 64-bit Windows 8.1 and using ROP to bypass Supervisor Mode Execution Prevention.
14 posts
Porting the HEVD buffer overflow exploit to 64-bit Windows 8.1 and using ROP to bypass Supervisor Mode Execution Prevention.
Developing a kernel stack buffer overflow exploit against HackSysExtremeVulnerableDriver on 32-bit Windows 7 with token-stealing shellcode.
Guide to setting up both network and serial kernel debugging for Windows VMs in VMware Workstation Pro using WinDbg.
Setting up a kernel debugger, loading a driver into IDA, rebasing the text segment, and tracing IRPs through a live driver.
Building a driver that handles DeviceIoControl requests and exploring buffered, direct, and neither I/O methods.
How IRPs, IO Stack Locations, and dispatch functions work together to let user-mode applications communicate with kernel drivers.
Setting up a driver development environment in Visual Studio and writing a minimal kernel driver that loads and unloads.
A history of Windows drivers and an explanation of what they are, the different types, and how they fit into the modern Windows kernel.
Introduction to the Windows driver exploitation series — who it's for, what tools you'll need, and why drivers are a great target.
Writeup for a Meltdown-style speculative execution exploit challenge on theLEG architecture, authored for UMass CTF 2025.
Step-by-step guide to decrypting the Signal desktop database on Windows, covering both the old plaintext key method and the new DPAPI-protected key.
Decrypting Signal messages and extracting credentials from a Windows memory dump to solve the HTB Binary Badlands 2024 forensics challenge.
Solving the One Step Closer challenge from the HTB University CTF 2023.
Investigating persistent access on a compromised OpenWRT router image from the HTB Uni CTF 2023.