This talk will have two primary focus points with the goal of providing useful information for both penetration testers as well as vulnerability developers looking to get into windows kernel exploitation. Attendees will leave with an understanding of common kernel exploit techniques. The first half will be an overview of Windows kernel vulnerabilities with a focus on exploitability. The talk will explore the common classes of vulnerabilities and reveal what they mean from an exploitability perspective. The factors that make some vulnerabilities easier and more reliable to exploit than others will be revealed. The second half of the talk will contain techniques useful for creating (semi-)reliable exploits. Techniques that will be covered include gaining code execution, and notes for implementing exploits for the Metasploit framework.