Advanced Windows NT - 2K Security
Offered By: Black Hat via YouTube
Course Description
Overview
Dive into advanced Windows NT/2K security concepts in this Black Hat USA 2000 conference talk. Explore Win32 payloads, reverse command shells, and decoupled attack processes. Learn about buffer overflow techniques and reverse shells in user mode. Examine the next wave of exploits and subtle but malicious changes in Windows systems. Discover what security measures have already been implemented and gain insights into kernel mode injection techniques. Enhance your understanding of Windows security vulnerabilities and defense strategies in this comprehensive presentation by Joey.
Syllabus
Introduction
Welcome
Objectives
Resources
Win32 payloads
Reverse command shell
Decoupled attack process
Buffer overflow
Reverse shell
User mode
Next wave of exploits
Subtle but malicious changes
What has been done already
Kernel Mode Injection Techniques
Taught by
Black Hat
Related Courses
Software Design Threats and MitigationsUniversity of Colorado System via Coursera Information Security - 5 - Secure Systems Engineering
Indian Institute of Technology Madras via Swayam Unlocking Information Security I: From Cryptography to Buffer Overflows
Tel Aviv University via edX Unlocking Information Security
Tel Aviv University via edX Buffer Overflow Exploits (Arabic) | OSCP Preparation
Udemy