In this blog, we’ll briefly cover how CFI mitigations works, including CET, and how we can leverage COOP to effectively bypass Intel CET on the latest Windows releases.
The post Bypassing Intel CET with Counterfeit Objects first appeared on Offensive Security.
This article has been indexed from Offensive Security
Read the original article: