fengjixuchui / testbed Goto Github PK
View Code? Open in Web Editor NEWThis project forked from igorkorkin/testbed
This project demonstrates the privilege escalation for a user-mode process - cmd.exe using stack overflow in the kernel mode driver. The user-mode component 'testbed_console.exe' sends CTL_CODE with a payload to the vulnerable driver 'testbed_driver.sys', which call RtlCopyMemory without any checks. 'testbed_console.exe' includes 'testbed_driver.sys' has a resource.
Home Page: https://www.youtube.com/watch?v=obGn0Hhzoyk