This document discusses a technique for regaining control of a disk in the presence of a bootkit by leveraging the crash dump stack in Windows. It provides background on the crash dump stack and how it differs from the normal I/O path. It then describes how identifying and calling the crash dump port and miniport drivers allows sending I/O requests outside of the normal path to bypass bootkit filters and read/write directly to disk. The document concludes with an overview of how this technique can be demonstrated against the TDL4 bootkit.