YoVDO

What is eBPF and Why Should You Care?

Offered By: 44CON Information Security Conference via YouTube

Tags

44CON Courses Kernel Exploitation Courses eBPF Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the revolutionary eBPF technology in this 45-minute conference talk from 44CON 2022. Dive into the fundamentals of eBPF, its origins in the Linux kernel, and its ability to run sandboxed programs safely within the operating system kernel. Learn how to get started with eBPF, overcome common challenges, and leverage tools like Sysmon For Linux and Cilium/Tetragon for enhanced system observability. Discover various use cases for eBPF, from blue team security monitoring to custom program tracing, kernel vulnerability exploitation, and performance issue detection. Gain insights from Kev Sheldrake, an experienced security software engineer, as he shares his expertise on this exciting technology that's revolutionizing kernel-level programming and system analysis.

Syllabus

Kev Sheldrake - What is eBPF and why should you care?


Taught by

44CON Information Security Conference

Related Courses

XNU Heap Exploitation - From Kernel Bug to Kernel Control
nullcon via YouTube
Kernel Exploitation with a File System Fuzzer
Hack In The Box Security Conference via YouTube
iOS 10 Kernel Heap Revisited
Hack In The Box Security Conference via YouTube
Swiping Through Modern Security Features
Hack In The Box Security Conference via YouTube
Turning - Page Tables - Bypassing Advanced Kernel Mitigations Using Page Tables Manipulations
BSidesLV via YouTube