Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Dive into the advanced techniques of Direct Kernel Object Manipulation (DKOM) in this Black Hat conference talk presented by Jamie Butler. Explore the intricacies of manipulating Windows kernel objects to achieve stealth and evade detection. Learn about the potential security implications and countermeasures associated with DKOM techniques in the Windows 2004 environment. Gain insights into how attackers can leverage these methods to hide processes, alter system behavior, and bypass security mechanisms. Understand the challenges faced by security professionals in detecting and mitigating DKOM-based threats.