YoVDO

VMware Escapology - How to Houdini The Hypervisor

Offered By: YouTube

Tags

Conference Talks Courses Metasploit Courses HDFS Courses PCI Compliance Courses

Course Description

Overview

Explore VMware security vulnerabilities and escape techniques in this 47-minute conference talk from Derbycon 7. Dive into VMware architecture, backdoor PCI, and the Host Open exploit. Learn about the Ghost In The Shell technique, Metasploit module development, and a Deuse After Free attack. Gain insights into VMware escapology and hypervisor security through detailed explanations, demonstrations, and a comprehensive analysis of potential attack vectors.

Syllabus

Introduction
VMware Architecture
Backdoor
PCI
Scorecard
HDFS
Host Open
Ghost In The Shell
VMware Host Open
Metasploit Module
Dependencies
Demo
Deuse After Free
Conclusion


Related Courses

Fundamentos de Ciberseguridad: un enfoque práctico
Inter-American Development Bank via edX
The Complete Penetration Testing Bootcamp
Udemy
Don's Introduction to Ethical Hacking for Beginners
Udemy
Ultimate Ethical Hacking and Penetration Testing (UEH)
Udemy
Practice Your First Penetration Test: Kali & Metasploit Lab
Udemy