From Ring Zero to UID Zero
A couple of stories about kernel exploiting
Veröffentlicht am: 11.02.2008, 00:05 Uhr
Präsentation vom: 29.12.2007, 17:15 Uhr
Teilnehmer: sgrakkyu, twiz
Abstract: The process of exploiting kernel based vulnerabilities is one of the topics which have received more attention (and kindled more interest) among security researchers, coders and addicted.
Speakers: sgrakkyu, twiz
Language: en
Date: 2007-12-29
Time: 17:15
Room: Saal 3