YoVDO

Escape From The Docker KVM QEMU Machine

Offered By: Hack In The Box Security Conference via YouTube

Tags

Hack In The Box Security Conference Courses Docker Courses QEMU Courses

Course Description

Overview

Explore Docker and KVM-QEMU escape techniques in this comprehensive conference talk from Hack In The Box Security Conference. Dive into Docker's implementation principles, Linux kernel vulnerability exploitation, and container escape technologies. Learn about new escape methods for the latest Docker versions and intriguing kernel object manipulations. Discover QEMU escape technology, including memory layout analysis, security vulnerabilities in QEMU device emulators, and exploitation methods. Gain insights into virtualization and cloud platform security from experts Shengping Wang and Xu Liu as they present never-before-published material on escaping virtual environments and controlling host systems.

Syllabus

Intro
SPEAKER BIO
KEY TECHNIQUES
VULUNERABILITY
ATTACK DOCKER
NAME SPACES
TASK_STRUCT
CHROOT
ESCAPE POINT
GET FS_STRUCT
CHANGE FS_STRUCT
SWITCT NSPROXY
VIDEO
KVM-QEMU
KEY POINTS
QEMU MEMORY ON HOST
QEMU MEMORY MAPPING
GUEST OS MEMORY
EMULATED DEVICE
OTHER METHODS
EIP CONTROL ASM
MORE EIP CONTROL WAYS
VM EXPLOIT STEPS
BYPASS DEP&ASLR
CVE-2015-7504
OTHER EXPLOIT WAYS . SYS CALL
ATTACK DEMO


Taught by

Hack In The Box Security Conference

Related Courses

Linux for Network Engineers: Practical Linux with GNS3
Udemy
Architecture 4031: x86-64 Reset Vector: coreboot
OpenSecurityTraining2 via Independent
Linux Foundation Cert Prep: Virtualization (Ubuntu)
LinkedIn Learning
Embedded Linux
Udemy
Windows Inside of Linux
Chris Titus Tech via YouTube