Targeting Windows Kernel Driver Fuzzer
-
Updated
Nov 17, 2024 - Makefile
Targeting Windows Kernel Driver Fuzzer
Build your emulation environment as needed
improving zerosums smbdoor - a silent remote backdoor which abuses undoc. APIs in srvnet.sys
This project demonstrates the privilege escalation for a user-mode process - cmd.exe using stack overflow in the kernel mode driver. The user-mode component 'testbed_console.exe' sends CTL_CODE with a payload to the vulnerable driver 'testbed_driver.sys', which call RtlCopyMemory without any checks. 'testbed_console.exe' includes 'testbed_driver…
Add a description, image, and links to the windows-kernel-exploitation topic page so that developers can more easily learn about it.
To associate your repository with the windows-kernel-exploitation topic, visit your repo's landing page and select "manage topics."