https://github.com/gh057mz/business-ctf-2022-exploiting-a-windows-kernel-backdoor---opendoor-write-up
CTF write-up
https://github.com/gh057mz/business-ctf-2022-exploiting-a-windows-kernel-backdoor---opendoor-write-up
ctf-writeups exploi hackthebox kernel
Last synced: about 1 month ago
JSON representation
CTF write-up
- Host: GitHub
- URL: https://github.com/gh057mz/business-ctf-2022-exploiting-a-windows-kernel-backdoor---opendoor-write-up
- Owner: gh057mz
- Created: 2024-09-30T07:37:33.000Z (8 months ago)
- Default Branch: main
- Last Pushed: 2024-10-30T06:18:57.000Z (7 months ago)
- Last Synced: 2025-03-23T19:44:42.916Z (2 months ago)
- Topics: ctf-writeups, exploi, hackthebox, kernel
- Language: C
- Homepage: https://www.hackthebox.com/blog/open-door-business-ctf
- Size: 183 KB
- Stars: 8
- Watchers: 1
- Forks: 1
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
Awesome Lists containing this project
README
This is a write-up for the Business CTF 2022, focusing on exploiting a Windows kernel backdoor. The driver contains an arbitrary read and write vulnerability that we exploit to gain NT SYSTEM privileges. This is achieved through a technique known as token swapping.