YoVDO

Ring 0 to Ring -1 Exploitation with Hyper-V IPC

Offered By: SyScan360 via YouTube

Tags

Hyper-V Courses Inter-Process Communication Courses System Architecture Courses Privilege Escalation Courses Kernel Exploitation Courses

Course Description

Overview

Explore advanced exploitation techniques in a conference talk that delves into Ring 0 to Ring -1 exploitation using Hyper-V IPC. Gain insights into the intricacies of hypervisor vulnerabilities and learn how to leverage Inter-Process Communication (IPC) mechanisms within Hyper-V to escalate privileges from kernel mode to the hypervisor level. Discover potential attack vectors, understand the security implications of virtualization technologies, and examine real-world examples of exploiting Hyper-V IPC vulnerabilities. Enhance your knowledge of low-level system architecture, virtualization security, and advanced exploitation methodologies in this hour-long presentation from SyScan'15 Singapore.

Syllabus

SyScan'15 Singapore: Ring 0 to Ring -1 Exploitation with Hyper-V IPC


Taught by

SyScan360

Related Courses

Introduction to Operating Systems
Georgia Institute of Technology via Udacity
Secure Software Development: Implementation
Linux Foundation via edX
Electron From Scratch: Build Desktop Apps With JavaScript
Udemy
Chrome University
Google via YouTube
KARONTE - Detecting Insecure Multi-Binary Interactions in Embedded Firmware
IEEE via YouTube