Completed
Control-flow Hijacking and ACE on Windows 10 with CET enabled - Possible Ways to Circumvent CET
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
How to Survive the Hardware Assisted Control-Flow Integrity Enforcement
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 Software-based Control-flow Integrity Enforcement - Microsoft Control Flow Guard (CFG)
- 3 Software-based Control-flow Integrity Enforcement - Microsoft Return Flow Guard (RFG)
- 4 Intel Control-flow Enforcement Technology - The Principle of Shadow Stack
- 5 Intel Control-flow Enforcement Technology - The Principle of IBT.
- 6 Intel CET Implementation on Windows 10 - Shadow Stack Setup in
- 7 Shadow Stack Switching in Switch ToFiberContext
- 8 Control-flow Hijacking and ACE on Windows 10 with CET enabled - Possible Ways to Circumvent CET
- 9 with CET enabled - CFG Bypass by Abusing Ldrpwork Mechanism
- 10 10 with CET enabled - Vulnerable Code Analysis of Unwind Handler Hijacking
- 11 Control-flow Hijacking and ACE on Windows 10 with CET enabled - Vulnerable Code Analysis of Frame Consolidation Unwind Callback Routine Hijacking
- 12 Control-flow Hijacking and ACE on Windows 10 with CET enabled - Vulnerable Code Analysis of Thread Context Hijacking in Exception Unwind Process
- 13 Control-flow Hijacking and ACE on Windows 10 with CET enabled - Thread Context Hijacking in Exception Unwind Process