#HNSecurity

2024-10-09

We’ve just published the third and final part in our new series on Windows kernel driver vulnerability research and exploitation.

Exploiting AMD atdcm64a.sys arbitrary pointer dereference - Part 3:
security.humanativaspa.it/expl

In the previous articles, we covered the discovery of an arbitrary MSR read and an arbitrary pointer dereference vulnerability, and successfully confirmed them by putting together two PoCs. This time, we will craft a full exploit that chains both vulnerabilities to enable all privileges on Windows. Happy hacking!

#HumanativaGroup #HNSecurity #VulnerabilityResearch #ExploitDevelopment #Windows

2023-10-25

I’m really proud of the @hnsec blog!

We published articles about #web and #mobile #appsec, #IoT, #redteaming, #vulndev, #codereview

In a bit more than a couple of years of activity that’s a lot in my opinion. And we have more to come soon!

Well done, #hnsecurity team 💚

security.humanativaspa.it/

Client Info

Server: https://mastodon.social
Version: 2025.04
Repository: https://github.com/cyevgeniy/lmst