June 13, 2023, 1 p.m. | Shawn Westfall

Unit42 unit42.paloaltonetworks.com

We analyze Microsoft Windows' GUI, how it functions and some of the history of research into its exploitation.


The post Inside Win32k Exploitation: Background on Implementations of Win32k and Exploitation Methodologies appeared first on Unit 42.

cortex xdr cve-2021-1732 cve-2022-21882 exploitation functions gui history microsoft microsoft windows research unit 42 vulnerability win32k windows

More from unit42.paloaltonetworks.com / Unit42

Social Engineer For Reverse Engineering Exploit Study

@ Independent study | Remote

SITEC- Systems Security Administrator- Camp HM Smith

@ Peraton | Camp H.M. Smith, HI, United States

Cyberspace Intelligence Analyst

@ Peraton | Fort Meade, MD, United States

General Manager, Cybersecurity, Google Public Sector

@ Google | Virginia, USA; United States

Cyber Security Advisor

@ H&M Group | Stockholm, Sweden

Engineering Team Manager – Security Controls

@ H&M Group | Stockholm, Sweden