As promised, I wrote about my Windows 11 post exploitation technique to go from an arbitrary write/increment to a full read/write through I/O rings: windows-internals.com/one-i-o-ring-t…
The slides of our @reconmtl talk on the next generation of virtualization-based obfuscators are now available. @m_u00d8 & I show how to break current VMs and why these attacks will no longer work. We also discuss the next steps in deobfuscation research.
synthesis.to/presentations/…