Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Cyborg)
  • No Skin
Collapse
Brand Logo

CIRCLE WITH A DOT

alexandreborges@infosec.exchangeA

alexandreborges@infosec.exchange

@alexandreborges@infosec.exchange
About
Posts
1
Topics
1
Shares
0
Groups
0
Followers
0
Following
0

View Original

Posts

Recent Best Controversial

  • The eighth article of the Exploiting Reversing Series (ERS) is now live.
    alexandreborges@infosec.exchangeA alexandreborges@infosec.exchange

    The eighth article of the Exploiting Reversing Series (ERS) is now live. Titled “Exploitation Techniques | CVE-2024-30085 (Part 02)” this 91-page technical guide offers a comprehensive roadmap for vulnerability exploitation:

    Link Preview Image
    Exploiting Reversing (ER) series: article 08 | Exploitation Techniques: CVE-2024-30085 (part 02)

    Today I am releasing the eighth article in the Exploiting Reversing Series (ERS). In “Exploitation Techniques | CVE-2024-30085 (Part 02)” I provide a 91-page deep dive and a comprehensive roadmap for vulnerability exploitation: https://exploitreversing.com/wp-content/uploads/2026/03/exploit_reversing_08.pdf Key features of this edition: [+] Dual Exploit Strategies: Two distinct exploit versions leveraging the I/O Ring technique.[+] Exploit ALPC +…

    favicon

    Exploit Reversing (exploitreversing.com)

    Key features of this edition:

    [+] Dual Exploit Strategies: Two distinct exploit versions leveraging the I/O Ring mechanism.
    [+] Exploit ALPC + WNF OOB + Pipe Attributes + I/O Ring: elevation of privilege of a regular user to SYSTEM.
    [+] Replaced ALPC one-shot write with Pipe Attribute spray for I/O Ring RegBuffers corruption: more reliable adjacency control.
    [+] Exploit WNF OOB + I/O Ring Read/Write: elevation of privilege of a regular user to SYSTEM.
    [+] Pure I/O Ring primitive: eliminated ALPC dependency entirely. WNF overflow directly corrupts I/O Ring RegBuffers for arbitrary kernel read/write.
    [+] Solid Reliability: Two complete, stable exploits, including an improved cleanup stage.

    This article guides you through two additional techniques for exploiting the CVE-2024-30085 Heap Buffer Overflow. While demonstrated here, these methods can be adapted as exploitation techniques for many other kernel targets.

    I hope this serves as a definitive resource for your research. If you find it helpful, please feel free to share it or reach out with your feedback!

    Enjoy the read and have an excellent day.

    #exploit #exploitdevelopment #windows #exploitation #vulnerability #minifilterdriver #kernel #heapoverflow #ioring

    Link Preview Image
    Uncategorized exploit exploitdevelopm windows exploitation vulnerability
  • Login

  • Login or register to search.
  • First post
    Last post
0
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups