YoVDO

VMware Escapology - How to Houdini The Hypervisor

Offered By: YouTube

Tags

Conference Talks Courses Metasploit Courses HDFS Courses PCI Compliance Courses

Course Description

Overview

Explore VMware security vulnerabilities and escape techniques in this 47-minute conference talk from Derbycon 7. Dive into VMware architecture, backdoor PCI, and the Host Open exploit. Learn about the Ghost In The Shell technique, Metasploit module development, and a Deuse After Free attack. Gain insights into VMware escapology and hypervisor security through detailed explanations, demonstrations, and a comprehensive analysis of potential attack vectors.

Syllabus

Introduction
VMware Architecture
Backdoor
PCI
Scorecard
HDFS
Host Open
Ghost In The Shell
VMware Host Open
Metasploit Module
Dependencies
Demo
Deuse After Free
Conclusion


Related Courses

Big Data Essentials: HDFS, MapReduce and Spark RDD
Yandex via Coursera
Créez votre Data Lake
CentraleSupélec via OpenClassrooms
Big data Internship Program - Foundation
Udemy
Learning Hadoop
LinkedIn Learning
Azure Synapse SQL Pool - Implement Polybase
Coursera Project Network via Coursera