Ring 0 to Ring -1 Exploitation with Hyper-V IPC
Offered By: SyScan360 via YouTube
Course Description
Overview
Explore advanced exploitation techniques in a conference talk that delves into Ring 0 to Ring -1 exploitation using Hyper-V IPC. Gain insights into the intricacies of hypervisor vulnerabilities and learn how to leverage Inter-Process Communication (IPC) mechanisms within Hyper-V to escalate privileges from kernel mode to the hypervisor level. Discover potential attack vectors, understand the security implications of virtualization technologies, and examine real-world examples of exploiting Hyper-V IPC vulnerabilities. Enhance your knowledge of low-level system architecture, virtualization security, and advanced exploitation methodologies in this hour-long presentation from SyScan'15 Singapore.
Syllabus
SyScan'15 Singapore: Ring 0 to Ring -1 Exploitation with Hyper-V IPC
Taught by
SyScan360
Related Courses
Microsoft Windows Server 2012 Fundamentals: Hyper-VMicrosoft via edX Windows Server 2016: Virtualization
Microsoft via edX Advanced Server 2016 Administration: Hands-on Training
Udemy Windows Server 2016 Administration
Udemy Microsoft Azure: Backup and Disaster Recovery
LinkedIn Learning