Linux Vulnerabilities, Windows Exploits - Escalating Privileges with WSL
Offered By: Recon Conference via YouTube
Course Description
Overview
Explore the intricacies of exploiting Windows Subsystem for Linux (WSL) vulnerabilities in this 50-minute conference talk from Recon Brussels 2018. Delve into the complex integration of Linux executables within the Windows 10 kernel, uncovering the vast attack surface it presents. Follow the journey of discovering and analyzing a specific vulnerability, gaining insights into Microsoft's engineering feat of merging two disparate operating systems. Witness the demonstration of a Linux executable capable of overwriting Windows kernel memory through a series of syscalls. Learn about the challenges of exploiting such vulnerabilities in the face of modern anti-exploitation techniques, and discover the methods used to stabilize memory corruption and achieve arbitrary code execution in contemporary Windows 10 kernels. Gain valuable knowledge from security researcher Saar Amar as he shares his expertise in reverse engineering and exploiting userspace, kernel, and hypervisor vulnerabilities.
Syllabus
Recon Brussels 2018 - Linux Vulnerabilities, Windows Exploits: Escalating Privileges with WSL
Taught by
Recon Conference
Related Courses
Specialized Exploits: Stack Overflows and BypassesPluralsight Select Code Execution From Using SQLite
media.ccc.de via YouTube Format String Vulnerabilities 101 - Lecture 4
YouTube Behind the Scenes of Intel Security and Manageability Engine
Black Hat via YouTube BlackBerryOS 10 from a Security Perspective
Black Hat via YouTube