YoVDO

Practical Exploitation of Registry Vulnerabilities in the Windows Kernel

Offered By: OffensiveCon via YouTube

Tags

Windows Security Courses Reverse Engineering Courses Privilege Escalation Courses Windows Internals Courses Vulnerability Research Courses Kernel Exploitation Courses Memory Corruption Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore practical exploitation techniques for registry vulnerabilities in the Windows kernel through this 54-minute conference talk by Mateusz Jurczyk at OffensiveCon24. Gain insights into the intricacies of Windows registry security, learn about potential attack vectors, and understand the methodologies used to identify and exploit vulnerabilities in this critical system component. Delve into real-world examples and case studies that demonstrate the impact of registry-based exploits on Windows systems. Enhance your knowledge of offensive security practices and defensive strategies to protect against such vulnerabilities in enterprise environments.

Syllabus

OffensiveCon24 - Mateusz Jurczyk - Practical Exploitation of Registry Vulnerabilities


Taught by

OffensiveCon

Related Courses

Cybersecurity Roles, Processes & Operating System Security
IBM via Coursera
Operating Systems and Security
IBM via edX
Hacking in Practice: Intensive Ethical Hacking MEGA Course
Udemy
The Complete Cyber Security Course : Hackers Exposed!
Udemy
Learning Computer Security and Internet Safety
LinkedIn Learning