Windows Kernel Exploitation Part 3 - Non-paged Pool Overflow
Introduction
I’m largely unfamiliar with non-paged pools, but according to Microsoft docs, “The nonpaged pool consists of virtual memory addresses that are guaranteed to reside in physical memory as long as the corresponding kernel objects are allocated.” This wasn’t very helpful for me, but I thought I’d share it with you.
The vulnerability
This post is licensed under CC BY 4.0 by the author.