Crowdfense
Windows Wi-Fi Driver RCE Vulnerability - CVE-2024-30078 - Crowdfense
Analysis of CVE-2024-30078, a Windows Wi-Fi driver vulnerability. Detailed root cause analysis and exploitation constraints.
Windows Wi-Fi Driver RCE Vulnerability – CVE-2024-30078
🔗 Link
#cve
#binary
#exploitation
#vr
#CVE_2024_30078
———
🆔 @Infosec_Fortress
🔗 Link
#cve
#binary
#exploitation
#vr
#CVE_2024_30078
———
🆔 @Infosec_Fortress
👍1
Pumping Iron on the Musl Heap – Real World CVE-2022-24834 Exploitation on an Alpine mallocng Heap
🔗 Link
#binary
#exploitation
#heap
#cve
#CVE_2022_24834
———
🆔 @Infosec_Fortress
🔗 Link
#binary
#exploitation
#heap
#cve
#CVE_2022_24834
———
🆔 @Infosec_Fortress
Infosec Fortress
Fuzzing from First Principles #binary #fuzzing ——— 🆔 @Infosec_Fortress
YouTube
Fuzzing from First Principles with Alisa Esage
Join us with Alisa Esage for a livestream on "Fuzzing from First Principles!" This session will have a theoretical part and a practical part (light-weight). In the theoretical part Alisa will walk through a few slides to quickly plunge into the mathematical…
👍1
Exploring Android Exploitation: A Journey into Stack Overflow Vulnerability
🔗 Link
#android
#binary
#exploitation
#frida
———
🆔 @Infosec_Fortress
🔗 Link
#android
#binary
#exploitation
#frida
———
🆔 @Infosec_Fortress
Kousha Zanjani (INVOXES) Blog
Exploring Android Exploitation: A Journey into Stack Overflow Vulnerability
My journey into Android exploitation at the binary level started with a deep passion for the subject. I was determined to simplify the process as much as possible, but it turned out to be quite challenging.
👍2
Alfie CG
A step-by-step guide to writing an iOS kernel exploit
Introduction Memory management in XNU Page tables Physical use-after-free Exploitation strategy Heap spray Kernel memory read/write Conclusion Bonus: arm64e, PPL and SPTM
A step-by-step guide to writing an iOS kernel exploit
🔗 Link
#binary
#ios
#kernel
#exploitation
———
🆔 @Infosec_Fortress
🔗 Link
#binary
#ios
#kernel
#exploitation
———
🆔 @Infosec_Fortress
🔥2👍1
DEVCORE 戴夫寇爾
Streaming vulnerabilities from Windows Kernel - Proxying to Kernel - Part I | DEVCORE 戴夫寇爾
This research will discuss an overlooked attack surface that allowed us to find more than ten vulnerabilities within two months. Additionally, we will delve into a proxy-based logical vulnerability type that allows us to bypass most validations, enabling…
Streaming vulnerabilities from Windows Kernel - Proxying to Kernel
🔗 Link - Part 1
🔗 Link - Part 2
#binary
#exploitation
#windows
———
🆔 @Infosec_Fortress
🔗 Link - Part 1
🔗 Link - Part 2
#binary
#exploitation
#windows
———
🆔 @Infosec_Fortress
👍6🔥2
Memory Management - Part 1: Virtual memory and Paging concepts
🔗 Link
#cpu
#intel
#os
#memory_management
#paging
———
🆔 @Infosec_Fortress
🔗 Link
#cpu
#intel
#os
#memory_management
#paging
———
🆔 @Infosec_Fortress
🔥7👍2