CyberWire Daily cover image

On the hunt for popping up kernel drives. [Research Saturday]

CyberWire Daily

00:00

Hunting Down Vulnerable Kernel Drivers

This chapter discusses the process of hunting down vulnerable kernel drivers and how users can send IO control commands to affect kernel resources and bypass Windows or Microsoft's protections.

Play episode from 04:50
Transcript

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app