YoVDO

Practical Exploitation of Registry Vulnerabilities in the Windows Kernel

Offered By: OffensiveCon via YouTube

Tags

Windows Security Courses Reverse Engineering Courses Privilege Escalation Courses Windows Internals Courses Vulnerability Research Courses Kernel Exploitation Courses Memory Corruption Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore practical exploitation techniques for registry vulnerabilities in the Windows kernel through this 54-minute conference talk by Mateusz Jurczyk at OffensiveCon24. Gain insights into the intricacies of Windows registry security, learn about potential attack vectors, and understand the methodologies used to identify and exploit vulnerabilities in this critical system component. Delve into real-world examples and case studies that demonstrate the impact of registry-based exploits on Windows systems. Enhance your knowledge of offensive security practices and defensive strategies to protect against such vulnerabilities in enterprise environments.

Syllabus

OffensiveCon24 - Mateusz Jurczyk - Practical Exploitation of Registry Vulnerabilities


Taught by

OffensiveCon

Related Courses

CNIT 127: Exploit Development
CNIT - City College of San Francisco via Independent
Enterprise Security Fundamentals
Microsoft via edX
Penetration Testing - Post Exploitation
New York University (NYU) via edX
Ultimate Ethical Hacking and Penetration Testing (UEH)
Udemy
Hands-on Penetration Testing Labs 4.0
Udemy