Ring 0 to Ring -1 Exploitation with Hyper-V IPC
Offered By: SyScan360 via YouTube
Course Description
Overview
Explore advanced exploitation techniques in a conference talk that delves into Ring 0 to Ring -1 exploitation using Hyper-V IPC. Gain insights into the intricacies of hypervisor vulnerabilities and learn how to leverage Inter-Process Communication (IPC) mechanisms within Hyper-V to escalate privileges from kernel mode to the hypervisor level. Discover potential attack vectors, understand the security implications of virtualization technologies, and examine real-world examples of exploiting Hyper-V IPC vulnerabilities. Enhance your knowledge of low-level system architecture, virtualization security, and advanced exploitation methodologies in this hour-long presentation from SyScan'15 Singapore.
Syllabus
SyScan'15 Singapore: Ring 0 to Ring -1 Exploitation with Hyper-V IPC
Taught by
SyScan360
Related Courses
SAP S/4HANA – Deep DiveSAP Learning Information Security- II
Indian Institute of Technology Madras via Swayam Sistemas de gestión de la energía
Fundacion para la Eficiencia Energética via Independent Базы данных (Databases)
Saint Petersburg State University via Coursera Системное мышление
Moscow Institute of Physics and Technology via Coursera