← All talks

Kernel Exploitation: Stealing System Tokens #shorts

BSides Frankfurt0:558 viewsPublished 2026-01Watch on YouTube ↗
About this talk
See how kernel exploits work: steal the system token from process ID 4 and inject it into your process for system-level access. #SecurityExplained #Bsidesfrankfurt #Bsides #Bsidesfra #JuanSacco #KernelExploitation
Show transcript [en]

whatever going to show you here um this on part it's fine okay but what can you do with that I don't know so what can you do with this so typical pock so when you when you say uh an an overflow or he overflow what you typically see on on user mode is a calc right you see the calculator popping up oh it's fine so the poke on kernel is typically This is um getting the e- process structure and then getting the token from in most of the cases the process ID4 because that's hardcoded and then you steal that token and then you put that token into your new process. So that's how you get the system um

the system uh uh the system uh command Right.