YoVDO

Practical Exploitation of Registry Vulnerabilities in the Windows Kernel

Offered By: OffensiveCon via YouTube

Tags

Windows Security Courses Reverse Engineering Courses Privilege Escalation Courses Windows Internals Courses Vulnerability Research Courses Kernel Exploitation Courses Memory Corruption Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore practical exploitation techniques for registry vulnerabilities in the Windows kernel through this 54-minute conference talk by Mateusz Jurczyk at OffensiveCon24. Gain insights into the intricacies of Windows registry security, learn about potential attack vectors, and understand the methodologies used to identify and exploit vulnerabilities in this critical system component. Delve into real-world examples and case studies that demonstrate the impact of registry-based exploits on Windows systems. Enhance your knowledge of offensive security practices and defensive strategies to protect against such vulnerabilities in enterprise environments.

Syllabus

OffensiveCon24 - Mateusz Jurczyk - Practical Exploitation of Registry Vulnerabilities


Taught by

OffensiveCon

Related Courses

Dal Reverse engineering alla stampa 3D
University of Naples Federico II via Federica
Rapid Manufacturing
Indian Institute of Technology Kanpur via Swayam
Generative Design for Industrial Applications
Autodesk via Coursera
Fundamentos de Ciberseguridad: un enfoque práctico
Inter-American Development Bank via edX
Functional And Conceptual Design
Indian Institute of Technology Madras via Swayam