Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Breaking Boundaries: Investigating Vulnerable Drivers and Mitigating Risks

Ekoparty Security Conference via YouTube

Overview

Explore a comprehensive security conference talk that delves into the growing concern of vulnerable drivers and their security implications. Learn about Check Point Research's extensive analysis of the root causes behind driver vulnerabilities, discovering common patterns and characteristics shared among compromised drivers. Understand how these vulnerabilities, often surprisingly simple in nature, continue to proliferate within the LOLDrivers project. Examine the methodology used to identify thousands of potentially vulnerable drivers through mass hunting techniques. Gain insights into how security product drivers attempt to implement protective measures, and witness a practical demonstration of exploiting chained vulnerabilities to bypass security controls and elevate kernel privileges. Through real-world examples of compromising well-known security products, grasp the critical concept that fundamental design flaws in drivers will inevitably be exploited, regardless of security mechanisms in place.

Syllabus

Breaking Boundaries: Investigating Vulnerable Drivers and Mitigating Risks - Jiri Vinopal - EKO 2024

Taught by

Ekoparty Security Conference

Reviews

Start your review of Breaking Boundaries: Investigating Vulnerable Drivers and Mitigating Risks

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.