YoVDO

Advanced Windows NT - 2K Security

Offered By: Black Hat via YouTube

Tags

Black Hat Courses Cybersecurity Courses Ethical Hacking Courses Buffer Overflow Courses Reverse Shell Courses

Course Description

Overview

Dive into advanced Windows NT/2K security concepts in this Black Hat USA 2000 conference talk. Explore Win32 payloads, reverse command shells, and decoupled attack processes. Learn about buffer overflow techniques and reverse shells in user mode. Examine the next wave of exploits and subtle but malicious changes in Windows systems. Discover what security measures have already been implemented and gain insights into kernel mode injection techniques. Enhance your understanding of Windows security vulnerabilities and defense strategies in this comprehensive presentation by Joey.

Syllabus

Introduction
Welcome
Objectives
Resources
Win32 payloads
Reverse command shell
Decoupled attack process
Buffer overflow
Reverse shell
User mode
Next wave of exploits
Subtle but malicious changes
What has been done already
Kernel Mode Injection Techniques


Taught by

Black Hat

Related Courses

Software Design Threats and Mitigations
University of Colorado System via Coursera
Information Security - 5 - Secure Systems Engineering
Indian Institute of Technology Madras via Swayam
Unlocking Information Security I: From Cryptography to Buffer Overflows
Tel Aviv University via edX
Unlocking Information Security
Tel Aviv University via edX
Buffer Overflow Exploits (Arabic) | OSCP Preparation
Udemy