Remote Windows Kernel Exploitation - Step In To The Ring 0 presented at Blackhat USA 2005

by Barnaby Jack,

Tags: Security Exploitation

Summary : Almost every possible method and
technique regarding Windows exploitation has been discussed in depth.
Surprisingly, a topic that has rarely been touched on publicly is the
remote exploitation of Win32 kernel vulnerabilities; a number of kernel
vulnerabilities have been published, yet no exploit code has surfaced in
the public arena. I predict we will see more kernel vulnerabilities in
the future, as more core networking components are being implemented at
the driver level.