YoVDO

Ring 0 to Ring -1 Exploitation with Hyper-V IPC

Offered By: SyScan360 via YouTube

Tags

Hyper-V Courses Inter-Process Communication Courses System Architecture Courses Privilege Escalation Courses Kernel Exploitation Courses

Course Description

Overview

Explore advanced exploitation techniques in a conference talk that delves into Ring 0 to Ring -1 exploitation using Hyper-V IPC. Gain insights into the intricacies of hypervisor vulnerabilities and learn how to leverage Inter-Process Communication (IPC) mechanisms within Hyper-V to escalate privileges from kernel mode to the hypervisor level. Discover potential attack vectors, understand the security implications of virtualization technologies, and examine real-world examples of exploiting Hyper-V IPC vulnerabilities. Enhance your knowledge of low-level system architecture, virtualization security, and advanced exploitation methodologies in this hour-long presentation from SyScan'15 Singapore.

Syllabus

SyScan'15 Singapore: Ring 0 to Ring -1 Exploitation with Hyper-V IPC


Taught by

SyScan360

Related Courses

SAP S/4HANA – Deep Dive
SAP Learning
Information Security- II
Indian Institute of Technology Madras via Swayam
Sistemas de gestión de la energía
Fundacion para la Eficiencia Energética via Independent
Базы данных (Databases)
Saint Petersburg State University via Coursera
Системное мышление
Moscow Institute of Physics and Technology via Coursera