Completed
Metasploit
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Practical Windows Kernel Exploitation
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 Agenda
- 3 Improving Reliability
- 4 Why Exploit
- 5 Google Security Research
- 6 Common Vulnerability Classes
- 7 What is it
- 8 How to exploit it
- 9 How to replace it
- 10 WND Object
- 11 Mitigation Technologies
- 12 No Page Mapping
- 13 Disabling SMS
- 14 Metasploit
- 15 Ruby
- 16 Sea implementations
- 17 Environment detection
- 18 Shellcode
- 19 Source of instability
- 20 Corrupted structures
- 21 Token reference count
- 22 Returning control
- 23 System Service Post Call
- 24 Return on Success
- 25 Windows Local Privilege Escalation
- 26 Closing Thoughts
- 27 Windows 10 Win32