Completed
Introduction
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Metasploit Windows Kernel Exploitation
Automatically move to the next video in the Classroom when playback concludes
- 1 Introduction
- 2 About me
- 3 Metasploit
- 4 Why do we care
- 5 Vulnerabilities
- 6 Common Vulnerability Classes
- 7 Null Pointer Dereference
- 8 Use After Pointer
- 9 Reliable Code Execution
- 10 Conditioning
- 11 Useful Object
- 12 Mitigation Technologies
- 13 NoPage Mapping
- 14 Kernel Exploits
- 15 Ruby Implementation
- 16 C Implementation
- 17 Reliability
- 18 Corrupted Structures
- 19 Token Reference Count
- 20 Returning Control
- 21 Shell Code
- 22 Closing Thoughts
- 23 Cool Prizes
- 24 Further Reading
- 25 Thank You