Breaching the Depths of the Abyss: Exposing Rootkits - Track 2, Session 4
Offered By: HackMiami via YouTube
Course Description
Overview
Dive into the depths of rootkit technology and defense strategies in this 39-minute conference talk from HackMiami. Explore the inner workings of rootkits, advanced malware that embeds deep within compromised systems, and learn techniques for their detection and removal. Examine kernel exploitation tactics used by rootkits to maintain stealth and evade security controls. Discover how the Living Off The Land Drivers (LOLDRIVERS.IO) project can be utilized as a powerful tool for identifying and neutralizing these elusive threats. Gain insights into emerging trends in rootkit technology and understand the importance of proactive cybersecurity measures to protect both personal and enterprise-level systems. Equip yourself with essential knowledge to defend against these stealthy adversaries lurking in the digital realm.
Syllabus
Track 2 04 Breaching the Depths of the Abyss - Jose Hernandez - Michael Haag
Taught by
HackMiami
Related Courses
XNU Heap Exploitation - From Kernel Bug to Kernel Controlnullcon via YouTube Kernel Exploitation with a File System Fuzzer
Hack In The Box Security Conference via YouTube iOS 10 Kernel Heap Revisited
Hack In The Box Security Conference via YouTube Swiping Through Modern Security Features
Hack In The Box Security Conference via YouTube Turning - Page Tables - Bypassing Advanced Kernel Mitigations Using Page Tables Manipulations
BSidesLV via YouTube