YoVDO

Ring 0 to Ring -1 Exploitation with Hyper-V IPC

Offered By: SyScan360 via YouTube

Tags

Hyper-V Courses Inter-Process Communication Courses System Architecture Courses Privilege Escalation Courses Kernel Exploitation Courses

Course Description

Overview

Explore advanced exploitation techniques in a conference talk that delves into Ring 0 to Ring -1 exploitation using Hyper-V IPC. Gain insights into the intricacies of hypervisor vulnerabilities and learn how to leverage Inter-Process Communication (IPC) mechanisms within Hyper-V to escalate privileges from kernel mode to the hypervisor level. Discover potential attack vectors, understand the security implications of virtualization technologies, and examine real-world examples of exploiting Hyper-V IPC vulnerabilities. Enhance your knowledge of low-level system architecture, virtualization security, and advanced exploitation methodologies in this hour-long presentation from SyScan'15 Singapore.

Syllabus

SyScan'15 Singapore: Ring 0 to Ring -1 Exploitation with Hyper-V IPC


Taught by

SyScan360

Related Courses

XNU Heap Exploitation - From Kernel Bug to Kernel Control
nullcon via YouTube
Kernel Exploitation with a File System Fuzzer
Hack In The Box Security Conference via YouTube
iOS 10 Kernel Heap Revisited
Hack In The Box Security Conference via YouTube
Swiping Through Modern Security Features
Hack In The Box Security Conference via YouTube
Turning - Page Tables - Bypassing Advanced Kernel Mitigations Using Page Tables Manipulations
BSidesLV via YouTube