Linux Vulnerabilities, Windows Exploits - Escalating Privileges with WSL
Offered By: Recon Conference via YouTube
Course Description
Overview
Explore the intricacies of exploiting Windows Subsystem for Linux (WSL) vulnerabilities in this 50-minute conference talk from Recon Brussels 2018. Delve into the complex integration of Linux executables within the Windows 10 kernel, uncovering the vast attack surface it presents. Follow the journey of discovering and analyzing a specific vulnerability, gaining insights into Microsoft's engineering feat of merging two disparate operating systems. Witness the demonstration of a Linux executable capable of overwriting Windows kernel memory through a series of syscalls. Learn about the challenges of exploiting such vulnerabilities in the face of modern anti-exploitation techniques, and discover the methods used to stabilize memory corruption and achieve arbitrary code execution in contemporary Windows 10 kernels. Gain valuable knowledge from security researcher Saar Amar as he shares his expertise in reverse engineering and exploiting userspace, kernel, and hypervisor vulnerabilities.
Syllabus
Recon Brussels 2018 - Linux Vulnerabilities, Windows Exploits: Escalating Privileges with WSL
Taught by
Recon Conference
Related Courses
Advanced Ethical HackingCity College of San Francisco via California Community Colleges System Ethical Hacking & Network Defe
City College of San Francisco via California Community Colleges System Pentesting Fundamentals for Beginners
Packt via Coursera The Complete Pentesting and Privilege Escalation Course
Packt via Coursera CVE Series: HiveNightmare (CVE-2021-36934)
Cybrary