VMware Escapology - How to Houdini The Hypervisor
Offered By: YouTube
Course Description
Overview
Explore VMware security vulnerabilities and escape techniques in this 47-minute conference talk from Derbycon 7. Dive into VMware architecture, backdoor PCI, and the Host Open exploit. Learn about the Ghost In The Shell technique, Metasploit module development, and a Deuse After Free attack. Gain insights into VMware escapology and hypervisor security through detailed explanations, demonstrations, and a comprehensive analysis of potential attack vectors.
Syllabus
Introduction
VMware Architecture
Backdoor
PCI
Scorecard
HDFS
Host Open
Ghost In The Shell
VMware Host Open
Metasploit Module
Dependencies
Demo
Deuse After Free
Conclusion
Related Courses
Learning Security FrameworksLinkedIn Learning WordPress: Ecommerce
LinkedIn Learning Learning Secure Payments and PCI
LinkedIn Learning Encryption and Masking for Sensitive Apache Spark Analytics Addressing CCPA and Governance
Databricks via YouTube Cyber Insurance - What Makes a Good Fit for You
nullcon via YouTube