Streaming vulnerabilities from Windows Kernel - Proxying to Kernel - Part I
angelboy
2024-08-23This research will discuss an overlooked attack surface that allowed us to find more than ten vulnerabilities within two months. Additionally, we will delve into a proxy-based logical vulnerability type that allows us to bypass most validations, enabling us to successfully exploit Windows 11 in Pwn2Own Vancouver 2024.