Ring 0 to Ring -1 Exploitation with Hyper-V IPC
Offered By: SyScan360 via YouTube
Course Description
Overview
Explore advanced exploitation techniques in a conference talk that delves into Ring 0 to Ring -1 exploitation using Hyper-V IPC. Gain insights into the intricacies of hypervisor vulnerabilities and learn how to leverage Inter-Process Communication (IPC) mechanisms within Hyper-V to escalate privileges from kernel mode to the hypervisor level. Discover potential attack vectors, understand the security implications of virtualization technologies, and examine real-world examples of exploiting Hyper-V IPC vulnerabilities. Enhance your knowledge of low-level system architecture, virtualization security, and advanced exploitation methodologies in this hour-long presentation from SyScan'15 Singapore.
Syllabus
SyScan'15 Singapore: Ring 0 to Ring -1 Exploitation with Hyper-V IPC
Taught by
SyScan360
Related Courses
Introduction to Operating SystemsGeorgia Institute of Technology via Udacity Secure Software Development: Implementation
Linux Foundation via edX Electron From Scratch: Build Desktop Apps With JavaScript
Udemy Chrome University
Google via YouTube KARONTE - Detecting Insecure Multi-Binary Interactions in Embedded Firmware
IEEE via YouTube