https://github.com/gh057mz/hevd-writeups-win10
Writeups for the HackSys Extreme Vulnerable Driver on a Windows 10 20H2 target environment
https://github.com/gh057mz/hevd-writeups-win10
exploitation hevd hevd-solutions kernel-driver windows
Last synced: about 2 months ago
JSON representation
Writeups for the HackSys Extreme Vulnerable Driver on a Windows 10 20H2 target environment
- Host: GitHub
- URL: https://github.com/gh057mz/hevd-writeups-win10
- Owner: gh057mz
- Created: 2024-11-01T07:44:41.000Z (7 months ago)
- Default Branch: main
- Last Pushed: 2024-11-07T12:34:22.000Z (7 months ago)
- Last Synced: 2025-03-27T14:52:05.239Z (2 months ago)
- Topics: exploitation, hevd, hevd-solutions, kernel-driver, windows
- Language: C
- Homepage:
- Size: 688 KB
- Stars: 5
- Watchers: 1
- Forks: 0
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
Awesome Lists containing this project
README
**Repository Overview:**
This repository provides in-depth coverage of key vulnerability classes with hands-on examples and techniques. Each section explores exploitation strategies and mitigation bypasses in various vulnerability contexts.
### Vulnerability Classes Covered
1. **Stack Buffer Overflow**
* Shellcode stored in user land.
* Overflow the stack with a ROP chain.
* Use ROP chain to bypass SMEP & KVA.
* Use ROP gadgets to redirect execution to shellcode in user land.
* System State Restoration with Trap Frame after shellcode execution.2. **Arbitrary Write**
* Construct a read primitive using the write primitive.
* Traverse _EPROCES list using both primitives.
* Read the system process token using read primitive.
* Write the system process to the current process using the write primitive.