Critical Thinking - Bug Bounty Podcast

Episode 157: Crushing Pwn2Own & H1 with Kernel Driver Exploits

18 snips
Jan 15, 2026
Joining the discussion is Hyprdude (Hypr), a notable security researcher and exploit developer acclaimed for his kernel driver research on MediaTek. He shares insights on exploiting a MediaTek Wi-Fi driver vulnerability, detailing the technical nuances of heap overflow and chaining primitives for successful exploits. Hypr recounts his experiences at Pwn2Own, highlighting the pressure of live demonstrations and the challenges of navigating bug bounty programs. He encourages other hackers to explore IoT, where low-level bugs abound, emphasizing the practical skills gained from real-world exploit development.
Ask episode
AI Snips
Chapters
Transcript
Episode notes
ANECDOTE

Built Kernel Exploit Largely Without A Debugger

  • Hyprdude developed a kernel exploit against a Netgear router while largely 'blind' with no kernel debugger attached.
  • He iterated by reading source and trial-and-error, rebooting the device many times to observe crashes and traces.
INSIGHT

Heap Metadata Corruption Yields Arbitrary Allocations

  • Small out-of-bounds writes can corrupt slab free-list pointers and create controlled allocations.
  • Overwriting a free chunk's next pointer lets a later allocation return memory at an attacker-chosen address.
ADVICE

Use modprobe_path For Simple Kernel-to-User Exec

  • Overwrite kernel modprobe_path to get userland code executed from kernel context when you have arbitrary kernel write.
  • Drop a controlled binary at the path and trigger execution to gain a shell without complex kernel mapping.
Get the Snipd Podcast app to discover more snips from this episode
Get the app