YoVDO

Linux Vulnerabilities, Windows Exploits - Escalating Privileges with WSL

Offered By: Recon Conference via YouTube

Tags

REcon Conference Courses Reverse Engineering Courses Privilege Escalation Courses Vulnerability Analysis Courses Security Research Courses Windows Subsystem for Linux Courses Arbitrary Code Execution Courses Memory Corruption Courses

Course Description

Overview

Explore the intricacies of exploiting Windows Subsystem for Linux (WSL) vulnerabilities in this 50-minute conference talk from Recon Brussels 2018. Delve into the complex integration of Linux executables within the Windows 10 kernel, uncovering the vast attack surface it presents. Follow the journey of discovering and analyzing a specific vulnerability, gaining insights into Microsoft's engineering feat of merging two disparate operating systems. Witness the demonstration of a Linux executable capable of overwriting Windows kernel memory through a series of syscalls. Learn about the challenges of exploiting such vulnerabilities in the face of modern anti-exploitation techniques, and discover the methods used to stabilize memory corruption and achieve arbitrary code execution in contemporary Windows 10 kernels. Gain valuable knowledge from security researcher Saar Amar as he shares his expertise in reverse engineering and exploiting userspace, kernel, and hypervisor vulnerabilities.

Syllabus

Recon Brussels 2018 - Linux Vulnerabilities, Windows Exploits: Escalating Privileges with WSL


Taught by

Recon Conference

Related Courses

Advanced Ethical Hacking
City College of San Francisco via California Community Colleges System
Ethical Hacking & Network Defe
City College of San Francisco via California Community Colleges System
Pentesting Fundamentals for Beginners
Packt via Coursera
The Complete Pentesting and Privilege Escalation Course
Packt via Coursera
CVE Series: HiveNightmare (CVE-2021-36934)
Cybrary