YoVDO

Practical Exploitation of Registry Vulnerabilities in the Windows Kernel

Offered By: OffensiveCon via YouTube

Tags

Windows Security Courses Reverse Engineering Courses Privilege Escalation Courses Windows Internals Courses Vulnerability Research Courses Kernel Exploitation Courses Memory Corruption Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore practical exploitation techniques for registry vulnerabilities in the Windows kernel through this 54-minute conference talk by Mateusz Jurczyk at OffensiveCon24. Gain insights into the intricacies of Windows registry security, learn about potential attack vectors, and understand the methodologies used to identify and exploit vulnerabilities in this critical system component. Delve into real-world examples and case studies that demonstrate the impact of registry-based exploits on Windows systems. Enhance your knowledge of offensive security practices and defensive strategies to protect against such vulnerabilities in enterprise environments.

Syllabus

OffensiveCon24 - Mateusz Jurczyk - Practical Exploitation of Registry Vulnerabilities


Taught by

OffensiveCon

Related Courses

The RedTeam Blueprint - A Unique Guide To Ethical Hacking
Udemy
Indicators of Compromise - From Malware Analysis to Eradication
44CON Information Security Conference via YouTube
Counterfeiting the Pipes with FakeNet 2.0 - Part 2
Black Hat via YouTube
Advanced Process Injection Techniques
NorthSec via YouTube
Hypervisors in Your Toolbox - Monitoring and Controlling System Events with HyperPlatform
nullcon via YouTube