Learn the Skills Netflix, Meta, and Capital One Actually Hire For
Master Windows Internals - Kernel Programming, Debugging & Architecture
Overview
Google, IBM & Meta Certificates — All 10,000+ Courses at 40% Off
One annual plan covers every course and certificate on Coursera. 40% off for a limited time.
Get Full Access
Explore a cybersecurity researcher's week-long investigation that uncovered seven critical vulnerabilities across multiple prominent software vendors in this 40-minute DEF CON 33 conference talk. Learn how a routine driver update led to the discovery of arbitrary code execution vulnerabilities exploitable directly from web browsers, revealing a dangerous pattern of privileged Windows services managing software with inadequate security controls. Follow the complete vulnerability research methodology from initial attack surface discovery through reverse engineering to successful exploitation of local privilege escalation and remote code execution flaws. Gain insights into the systematic security weaknesses present in vendor bloatware and driver management tools that create significant attack vectors on Windows systems. Understand the technical details behind CVE discoveries that demonstrate how common software patterns can lead to serious security compromises, and discover why these vulnerabilities represent fundamental security design failures that should be addressed in modern software development practices.
Syllabus
DEF CON 33 - 7 Vulns in 7 Days - Breaking Bloatware Faster Than It’s Built - Leon 'leonjza' Jacobs
Taught by
DEFCONConference