
This talk is going to be about subverting the Windows kernel. So the we're going to go through four stages on this presentation. First we have to cover the fundamentals because not a lot of uh security professionals are in deep on uh on Windows kernel. So we're going to cover those fundamentals. Also it's also it helps to do a recap so you can understand this the the second part that is going to be the software the metab root kits that's the first stage of starting to interact with the windows kernels developing uh for the windows kernel and then we going to cover windows kernel exploitations I mean how can you abuse of the yeah of yeah we'll cover that later or how can
you abuse the windows kernel to yeah to get to do what you want it to do and protections. That's going to be what are uh the protections that I have to yeah that I have to fight off in yeah to actually achieve achieve that. And I have a lot of PPTs but also I have a demos I'm going to try to fly through. If you have questions let's not wait to the end. I'm going to try to cover quickly otherwise you can keep it and then at the end we can do a round of uh questions and answers. So first why is this important? you might be aware of also I seen uh some of the vendors here
as well they are going into this direction basically uh the golden era of uh exploits and exploitation doing basic uh buffer overflows and so on is gone long gone Okay.