Skip to content

Commit 642d94a

Browse files
authored
headings are harddddddddddd
1 parent eff4a63 commit 642d94a

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

content/24h2-nt-exploit/index.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -90,7 +90,7 @@ Since the syscall handler’s memory is present in the user mode page tables, on
9090

9191
This is, as stated above, a very short summary of EntryBleed. For a much more detailed description I highly recommend [reading the original article](https://www.willsroot.io/2022/12/entrybleed.html).
9292

93-
## Prefetch on Windows
93+
### Prefetch on Windows
9494

9595
After getting an understanding of EntryBleed on Linux, I started porting the technique to Windows. I initially assumed that I would have to contend with KVA shadowing (the Windows equivalent of KPTI) but soon realized that KVA shadowing is now disabled on modern Windows 11 machines. This means that since there is no longer any isolation between user and kernel page tables, not only is the memory for the syscall handler present in user mode page tables, but the entire kernel address space is present.
9696

0 commit comments

Comments
 (0)