
So first why is this important? You might be aware of also I seen uh some of the vendors here as well. They are going into this direction. Basically uh the golden era of uh exploits and exploitation doing basic uh buffer overflows and so on is gone long gone. So but the the threats are evolving now and as well the protections are evolving. So we have a bunch of uh uh uh here a bunch of uh vendors names so for you to understand how is this happening and as you can see the mon endpoint security is getting a lot of coverage on that right so uh what I mean with this in a long story short is like everything
is moving into aristics into edrs into sensors into telemetry right if you want to understand it's not for this talk is this is not a prerequisite for this presentation but it's a prerequisite for uh uh doing windows kernel exploitation or developing rootkits. Uh so you need to understand first what is an overflow and their types. How do you do depth uh bypass? How ASLR works? A little bit of hip management because there is a lot of a hip uh in kernel.