YoVDO

Metasploit Windows Kernel Exploitation

Offered By: YouTube

Tags

Conference Talks Courses Cybersecurity Courses C Programming Courses Ruby Courses Metasploit Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore Windows kernel exploitation techniques using Metasploit in this 51-minute conference talk from BSides Cleveland 2015. Delve into common vulnerability classes, including null pointer dereference and use-after-free, while learning about mitigation technologies and reliable code execution methods. Gain insights into kernel exploits through Ruby and C implementations, and understand the intricacies of corrupted structures and token reference counts. Discover practical shell code techniques and acquire valuable knowledge for further exploration in the field of Windows kernel exploitation.

Syllabus

Introduction
About me
Metasploit
Why do we care
Vulnerabilities
Common Vulnerability Classes
Null Pointer Dereference
Use After Pointer
Reliable Code Execution
Conditioning
Useful Object
Mitigation Technologies
NoPage Mapping
Kernel Exploits
Ruby Implementation
C Implementation
Reliability
Corrupted Structures
Token Reference Count
Returning Control
Shell Code
Closing Thoughts
Cool Prizes
Further Reading
Thank You


Related Courses

Building Geospatial Apps on Postgres, PostGIS, & Citus at Large Scale
Microsoft via YouTube
Unlocking the Power of ML for Your JavaScript Applications with TensorFlow.js
TensorFlow via YouTube
Managing the Reactive World with RxJava - Jake Wharton
ChariotSolutions via YouTube
What's New in Grails 2.0
ChariotSolutions via YouTube
Performance Analysis of Apache Spark and Presto in Cloud Environments
Databricks via YouTube