Kernel Exploit Hunting and Mitigation
Offered By: Hack In The Box Security Conference via YouTube
Course Description
Overview
Explore kernel exploit hunting and mitigation techniques in this conference talk from the Hack In The Box Security Conference. Dive into the world of cyberwarfare and multi-level attacks, focusing on Windows kernel vulnerabilities exploited by APT attackers and botnet operators. Examine real-world examples of malware families utilizing kernel exploits, including Dyre, Turla, and Necurs. Learn how to proactively discover effective samples with kernel exploits through dynamic analysis systems. Gain insights into analyzing kernel exploits that bypass HIPS detection and prevention methodologies. Witness a demonstration of a prototype tool for effective kernel exploit mitigation. Benefit from the speakers' extensive experience in malware analysis, reverse engineering, and Windows kernel vulnerability research.
Syllabus
Introduction
Wayne Low
Agenda
User Account Control
Primitive
Limitations
Criminal Exploits
How To Identify What Web
Case Study
Despite
Despite Workflow
EOP Explore
Integrity Level
Taught by
Hack In The Box Security Conference
Related Courses
Computer SecurityStanford University via Coursera Cryptography II
Stanford University via Coursera Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera Building an Information Risk Management Toolkit
University of Washington via Coursera Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network