Windows OS Peeling Back the Layers: Understanding Windows components Architecture through SAC/EMS Reversing
Windows OS Remote Kernel Debugging Windows virtual machine (Generation 2) using Serial COM running inside Hyper-v
Exploit Development Nostalgic memory - An attempt to understand the evolution of memory corruption mitigations - Part 4 7 January 2024
Exploit Development Nostalgic memory - An attempt to understand the evolution of memory corruption mitigations - Part 3 7 January 2024
Exploit Development Nostalgic memory - An attempt to understand the evolution of memory corruption mitigations - Part 2 7 January 2024
Exploit Development Nostalgic memory - An attempt to understand the evolution of memory corruption mitigations - Part 1 7 January 2024
Reverse engineering Remote debugging windows kernel driver(without symbols) using windbg In this post we are going to learn few tips and tricks to debug a Windows kernel driver without symbols in windbg. By Shubham Dubey 2 Jul 2021
Firmware Firmware security 3: Digging into System management mode (SMM) In the third part of the series we are going to discuss System management mode (SMM) and it's security. Moreover, We will try to interact with the SMM from our linux system. By Shubham Dubey 20 Mar 2021
gate.io Firmware security 1: Playing with PCI device memory In this part of the series we will go through the basic of PCI devices and their memory. We will be developing linux kernel driver and using chipsec to analyze the data practically. By Shubham Dubey 14 Nov 2020
Exploit Development Impact of x64 calling convention in format string exploitation In this post I will try to give you a brief on how format string exploitation can differ in 64 bit architecture due to different calling convention in 64 bit. By Shubham Dubey 20 Oct 2020