Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

DKOM - Direct Kernel Object Manipulation

Black Hat via YouTube

Overview

Dive into the advanced techniques of Direct Kernel Object Manipulation (DKOM) in this Black Hat conference talk presented by Jamie Butler. Explore the intricacies of manipulating Windows kernel objects to achieve stealth and evade detection. Learn about the potential security implications and countermeasures associated with DKOM techniques in the Windows 2004 environment. Gain insights into how attackers can leverage these methods to hide processes, alter system behavior, and bypass security mechanisms. Understand the challenges faced by security professionals in detecting and mitigating DKOM-based threats.

Syllabus

Black Hat Windows 2004 - DKOM (Direct Kernel Object Manipulation)

Taught by

Black Hat

Reviews

Start your review of DKOM - Direct Kernel Object Manipulation

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.