What is eBPF and Why Should You Care?
Offered By: 44CON Information Security Conference via YouTube
Course Description
Overview
Explore the revolutionary eBPF technology in this 45-minute conference talk from 44CON 2022. Dive into the fundamentals of eBPF, its origins in the Linux kernel, and its ability to run sandboxed programs safely within the operating system kernel. Learn how to get started with eBPF, overcome common challenges, and leverage tools like Sysmon For Linux and Cilium/Tetragon for enhanced system observability. Discover various use cases for eBPF, from blue team security monitoring to custom program tracing, kernel vulnerability exploitation, and performance issue detection. Gain insights from Kev Sheldrake, an experienced security software engineer, as he shares his expertise on this exciting technology that's revolutionizing kernel-level programming and system analysis.
Syllabus
Kev Sheldrake - What is eBPF and why should you care?
Taught by
44CON Information Security Conference
Related Courses
XNU Heap Exploitation - From Kernel Bug to Kernel Controlnullcon via YouTube Kernel Exploitation with a File System Fuzzer
Hack In The Box Security Conference via YouTube iOS 10 Kernel Heap Revisited
Hack In The Box Security Conference via YouTube Swiping Through Modern Security Features
Hack In The Box Security Conference via YouTube Turning - Page Tables - Bypassing Advanced Kernel Mitigations Using Page Tables Manipulations
BSidesLV via YouTube