Points: 600

Tags: kernel pwn windows 

Poll rating:

Via a database breach we've managed to obtain credentials for a malicious developer, and located a workstation they have previously used to develop their kernel backdoors. Luckily, they forgot to uninstall it from their own system - can you use their own tools against them and uncover their secrets?

user: Dev
password: developer

Writeups

ActionRatingAuthor team
Read writeup
not rated
PwntasticFour
You need to authenticate and join a team to post writeups