VMware Escapology - How to Houdini The Hypervisor
Offered By: YouTube
Course Description
Overview
Explore VMware security vulnerabilities and escape techniques in this 47-minute conference talk from Derbycon 7. Dive into VMware architecture, backdoor PCI, and the Host Open exploit. Learn about the Ghost In The Shell technique, Metasploit module development, and a Deuse After Free attack. Gain insights into VMware escapology and hypervisor security through detailed explanations, demonstrations, and a comprehensive analysis of potential attack vectors.
Syllabus
Introduction
VMware Architecture
Backdoor
PCI
Scorecard
HDFS
Host Open
Ghost In The Shell
VMware Host Open
Metasploit Module
Dependencies
Demo
Deuse After Free
Conclusion
Related Courses
Big Data Essentials: HDFS, MapReduce and Spark RDDYandex via Coursera Créez votre Data Lake
CentraleSupélec via OpenClassrooms Big data Internship Program - Foundation
Udemy Learning Hadoop
LinkedIn Learning Azure Synapse SQL Pool - Implement Polybase
Coursera Project Network via Coursera