Exploit Development: No Code Execution? No Problem! Living The Age of VBS, HVCI, and Kernel CFG

·Connor McGarr··

Introduction I firmly believe there is nothing in life that is more satisfying than wielding the ability to execute unsigned-shellcode. Forcing an application to execute some kind of code the developer of the vulnerable application never intended is what first got me hooked on memory corruption. However, as we saw in my last blog series on browser exploitation, this is already something that, if possible, requires an expensive exploit - in terms of cost to develop. With the advent of Arbitrary C...

Read full article →

Related Articles

Google Chrome silently installs a 4 GB AI model on your device without consent
john-doe · Hacker News · 16d ago
DNSSEC disruption affecting .de domains – Resolved
warpspin · Hacker News · 15d ago
Security through obscurity is not bad
mobeigi · Hacker News · 18d ago
US healthcare marketplaces shared citizenship and race data with ad tech giants
ZeidJ · Hacker News · 16d ago
The text mode lie: why modern TUIs are a nightmare for accessibility
SpyCoder77 · Hacker News · 17d ago