Escape From The Docker KVM QEMU Machine
Offered By: Hack In The Box Security Conference via YouTube
Course Description
Overview
Explore Docker and KVM-QEMU escape techniques in this comprehensive conference talk from Hack In The Box Security Conference. Dive into Docker's implementation principles, Linux kernel vulnerability exploitation, and container escape technologies. Learn about new escape methods for the latest Docker versions and intriguing kernel object manipulations. Discover QEMU escape technology, including memory layout analysis, security vulnerabilities in QEMU device emulators, and exploitation methods. Gain insights into virtualization and cloud platform security from experts Shengping Wang and Xu Liu as they present never-before-published material on escaping virtual environments and controlling host systems.
Syllabus
Intro
SPEAKER BIO
KEY TECHNIQUES
VULUNERABILITY
ATTACK DOCKER
NAME SPACES
TASK_STRUCT
CHROOT
ESCAPE POINT
GET FS_STRUCT
CHANGE FS_STRUCT
SWITCT NSPROXY
VIDEO
KVM-QEMU
KEY POINTS
QEMU MEMORY ON HOST
QEMU MEMORY MAPPING
GUEST OS MEMORY
EMULATED DEVICE
OTHER METHODS
EIP CONTROL ASM
MORE EIP CONTROL WAYS
VM EXPLOIT STEPS
BYPASS DEP&ASLR
CVE-2015-7504
OTHER EXPLOIT WAYS . SYS CALL
ATTACK DEMO
Taught by
Hack In The Box Security Conference
Related Courses
Linux for Network Engineers: Practical Linux with GNS3Udemy Architecture 4031: x86-64 Reset Vector: coreboot
OpenSecurityTraining2 via Independent Linux Foundation Cert Prep: Virtualization (Ubuntu)
LinkedIn Learning Embedded Linux
Udemy Windows Inside of Linux
Chris Titus Tech via YouTube