Practical Exploitation of Registry Vulnerabilities in the Windows Kernel
Offered By: OffensiveCon via YouTube
Course Description
Overview
Explore practical exploitation techniques for registry vulnerabilities in the Windows kernel through this 54-minute conference talk by Mateusz Jurczyk at OffensiveCon24. Gain insights into the intricacies of Windows registry security, learn about potential attack vectors, and understand the methodologies used to identify and exploit vulnerabilities in this critical system component. Delve into real-world examples and case studies that demonstrate the impact of registry-based exploits on Windows systems. Enhance your knowledge of offensive security practices and defensive strategies to protect against such vulnerabilities in enterprise environments.
Syllabus
OffensiveCon24 - Mateusz Jurczyk - Practical Exploitation of Registry Vulnerabilities
Taught by
OffensiveCon
Related Courses
The RedTeam Blueprint - A Unique Guide To Ethical HackingUdemy Indicators of Compromise - From Malware Analysis to Eradication
44CON Information Security Conference via YouTube Counterfeiting the Pipes with FakeNet 2.0 - Part 2
Black Hat via YouTube Advanced Process Injection Techniques
NorthSec via YouTube Hypervisors in Your Toolbox - Monitoring and Controlling System Events with HyperPlatform
nullcon via YouTube