YoVDO

Ring 0 to Ring -1 Exploitation with Hyper-V IPC

Offered By: SyScan360 via YouTube

Tags

Hyper-V Courses Inter-Process Communication Courses System Architecture Courses Privilege Escalation Courses Kernel Exploitation Courses

Course Description

Overview

Explore advanced exploitation techniques in a conference talk that delves into Ring 0 to Ring -1 exploitation using Hyper-V IPC. Gain insights into the intricacies of hypervisor vulnerabilities and learn how to leverage Inter-Process Communication (IPC) mechanisms within Hyper-V to escalate privileges from kernel mode to the hypervisor level. Discover potential attack vectors, understand the security implications of virtualization technologies, and examine real-world examples of exploiting Hyper-V IPC vulnerabilities. Enhance your knowledge of low-level system architecture, virtualization security, and advanced exploitation methodologies in this hour-long presentation from SyScan'15 Singapore.

Syllabus

SyScan'15 Singapore: Ring 0 to Ring -1 Exploitation with Hyper-V IPC


Taught by

SyScan360

Related Courses

CNIT 127: Exploit Development
CNIT - City College of San Francisco via Independent
Enterprise Security Fundamentals
Microsoft via edX
Penetration Testing - Post Exploitation
New York University (NYU) via edX
Ultimate Ethical Hacking and Penetration Testing (UEH)
Udemy
Hands-on Penetration Testing Labs 4.0
Udemy