Guest Kovalski Posted August 21, 2012 Report Posted August 21, 2012 Remote and Local Exploitation of Network Drivershttp://www.blackhat.com/presentations/bh-usa-07/Bulygin/Presentation/bh-usa-07-bulygin.pdfRemote Windows Kernel Exploitationhttp://www.eeye.com/eEyeDigitalSecurity/media/ResearchPapers/StepIntoTheRing.pdf?ext=.pdf Quote