YoVDO

DKOM - Direct Kernel Object Manipulation

Offered By: Black Hat via YouTube

Tags

Black Hat Courses Cybersecurity Courses Windows Security Courses

Course Description

Overview

Dive into the advanced techniques of Direct Kernel Object Manipulation (DKOM) in this Black Hat conference talk presented by Jamie Butler. Explore the intricacies of manipulating Windows kernel objects to achieve stealth and evade detection. Learn about the potential security implications and countermeasures associated with DKOM techniques in the Windows 2004 environment. Gain insights into how attackers can leverage these methods to hide processes, alter system behavior, and bypass security mechanisms. Understand the challenges faced by security professionals in detecting and mitigating DKOM-based threats.

Syllabus

Black Hat Windows 2004 - DKOM (Direct Kernel Object Manipulation)


Taught by

Black Hat

Related Courses

Computer Security
Stanford University via Coursera
Cryptography II
Stanford University via Coursera
Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera
Building an Information Risk Management Toolkit
University of Washington via Coursera
Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network