DKOM - Direct Kernel Object Manipulation
Offered By: Black Hat via YouTube
Course Description
Overview
Dive into the advanced techniques of Direct Kernel Object Manipulation (DKOM) in this Black Hat conference talk presented by Jamie Butler. Explore the intricacies of manipulating Windows kernel objects to achieve stealth and evade detection. Learn about the potential security implications and countermeasures associated with DKOM techniques in the Windows 2004 environment. Gain insights into how attackers can leverage these methods to hide processes, alter system behavior, and bypass security mechanisms. Understand the challenges faced by security professionals in detecting and mitigating DKOM-based threats.
Syllabus
Black Hat Windows 2004 - DKOM (Direct Kernel Object Manipulation)
Taught by
Black Hat
Related Courses
Computer SecurityStanford University via Coursera Cryptography II
Stanford University via Coursera Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera Building an Information Risk Management Toolkit
University of Washington via Coursera Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network