<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"><channel><title>UnderDunn</title><description>Security research, CTF writeups, and more.</description><link>https://underdunn.com/</link><item><title>Windows Drivers Series Part 8 - Bypassing SMEP</title><link>https://underdunn.com/series/windows-drivers-p8-smep-bypass/</link><guid isPermaLink="true">https://underdunn.com/series/windows-drivers-p8-smep-bypass/</guid><description>Porting the HEVD buffer overflow exploit to 64-bit Windows 8.1 and using ROP to bypass Supervisor Mode Execution Prevention.</description><pubDate>Wed, 20 Aug 2025 01:45:44 GMT</pubDate><category>Series</category></item><item><title>Windows Drivers Series Part 7 - Buffer Overflow on Windows 7</title><link>https://underdunn.com/series/windows-drivers-p7-buffer-overflow-win7/</link><guid isPermaLink="true">https://underdunn.com/series/windows-drivers-p7-buffer-overflow-win7/</guid><description>Developing a kernel stack buffer overflow exploit against HackSysExtremeVulnerableDriver on 32-bit Windows 7 with token-stealing shellcode.</description><pubDate>Fri, 15 Aug 2025 18:37:47 GMT</pubDate><category>Series</category></item><item><title>HowTo - Set up Windows Kernel Debugging in VMware</title><link>https://underdunn.com/research/windows-kernel-debugger/</link><guid isPermaLink="true">https://underdunn.com/research/windows-kernel-debugger/</guid><description>Guide to setting up both network and serial kernel debugging for Windows VMs in VMware Workstation Pro using WinDbg.</description><pubDate>Wed, 06 Aug 2025 18:59:28 GMT</pubDate><category>Research</category></item><item><title>Windows Drivers Series Part 6 - Debugging and Basic Rev</title><link>https://underdunn.com/series/windows-drivers-p6-debugging-drivers/</link><guid isPermaLink="true">https://underdunn.com/series/windows-drivers-p6-debugging-drivers/</guid><description>Setting up a kernel debugger, loading a driver into IDA, rebasing the text segment, and tracing IRPs through a live driver.</description><pubDate>Wed, 06 Aug 2025 15:35:29 GMT</pubDate><category>Series</category></item><item><title>Windows Drivers Series Part 5 - Basic Driver Functionality</title><link>https://underdunn.com/series/windows-drivers-p5-basic-driver-function/</link><guid isPermaLink="true">https://underdunn.com/series/windows-drivers-p5-basic-driver-function/</guid><description>Building a driver that handles DeviceIoControl requests and exploring buffered, direct, and neither I/O methods.</description><pubDate>Tue, 22 Jul 2025 17:20:31 GMT</pubDate><category>Series</category></item><item><title>Windows Drivers Series Part 4 - Interacting with the Driver</title><link>https://underdunn.com/series/windows-drivers-p4-interacting-with-driver/</link><guid isPermaLink="true">https://underdunn.com/series/windows-drivers-p4-interacting-with-driver/</guid><description>How IRPs, IO Stack Locations, and dispatch functions work together to let user-mode applications communicate with kernel drivers.</description><pubDate>Sun, 20 Jul 2025 15:46:16 GMT</pubDate><category>Series</category></item><item><title>Windows Drivers Series Part 3 - The Minimum Viable Driver</title><link>https://underdunn.com/series/windows-drivers-p3-minimum-viable-driver/</link><guid isPermaLink="true">https://underdunn.com/series/windows-drivers-p3-minimum-viable-driver/</guid><description>Setting up a driver development environment in Visual Studio and writing a minimal kernel driver that loads and unloads.</description><pubDate>Thu, 17 Jul 2025 23:45:29 GMT</pubDate><category>Series</category></item><item><title>Windows Drivers Series Part 2 - What&apos;s a Driver Anyways?</title><link>https://underdunn.com/series/windows-drivers-p2-whats-a-driver/</link><guid isPermaLink="true">https://underdunn.com/series/windows-drivers-p2-whats-a-driver/</guid><description>A history of Windows drivers and an explanation of what they are, the different types, and how they fit into the modern Windows kernel.</description><pubDate>Wed, 16 Jul 2025 21:14:58 GMT</pubDate><category>Series</category></item><item><title>Windows Drivers Series Part 1 - Overview</title><link>https://underdunn.com/series/windows-drivers-p1-overview/</link><guid isPermaLink="true">https://underdunn.com/series/windows-drivers-p1-overview/</guid><description>Introduction to the Windows driver exploitation series — who it&apos;s for, what tools you&apos;ll need, and why drivers are a great target.</description><pubDate>Tue, 15 Jul 2025 00:07:00 GMT</pubDate><category>Series</category></item><item><title>UMass CTF 2025 - Ghost in the Leg</title><link>https://underdunn.com/writeups/the-leg/</link><guid isPermaLink="true">https://underdunn.com/writeups/the-leg/</guid><description>Writeup for a Meltdown-style speculative execution exploit challenge on theLEG architecture, authored for UMass CTF 2025.</description><pubDate>Sun, 20 Apr 2025 20:00:00 GMT</pubDate><category>Writeups</category></item><item><title>HowTo - Decryption of Signal Messages on Windows</title><link>https://underdunn.com/research/signal-windows-decryption/</link><guid isPermaLink="true">https://underdunn.com/research/signal-windows-decryption/</guid><description>Step-by-step guide to decrypting the Signal desktop database on Windows, covering both the old plaintext key method and the new DPAPI-protected key.</description><pubDate>Mon, 27 Jan 2025 04:28:04 GMT</pubDate><category>Research</category></item><item><title>HackTheBox Binary Badlands 2024 - Signaling Victorious</title><link>https://underdunn.com/writeups/signaling-victorious/</link><guid isPermaLink="true">https://underdunn.com/writeups/signaling-victorious/</guid><description>Decrypting Signal messages and extracting credentials from a Windows memory dump to solve the HTB Binary Badlands 2024 forensics challenge.</description><pubDate>Thu, 19 Dec 2024 01:31:50 GMT</pubDate><category>Writeups</category></item><item><title>HackTheBox University CTF 2023 - One Step Closer</title><link>https://underdunn.com/writeups/one-step-closer/</link><guid isPermaLink="true">https://underdunn.com/writeups/one-step-closer/</guid><description>Solving the One Step Closer challenge from the HTB University CTF 2023.</description><pubDate>Tue, 17 Oct 2023 16:23:50 GMT</pubDate><category>Writeups</category></item><item><title>HackTheBox University CTF 2023 - ZombieNet</title><link>https://underdunn.com/writeups/zombienet/</link><guid isPermaLink="true">https://underdunn.com/writeups/zombienet/</guid><description>Investigating persistent access on a compromised OpenWRT router image from the HTB Uni CTF 2023.</description><pubDate>Tue, 17 Oct 2023 16:23:50 GMT</pubDate><category>Writeups</category></item></channel></rss>