Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Escape From The Docker KVM QEMU Machine

Hack In The Box Security Conference via YouTube

Overview

Explore Docker and KVM-QEMU escape techniques in this comprehensive conference talk from Hack In The Box Security Conference. Dive into Docker's implementation principles, Linux kernel vulnerability exploitation, and container escape technologies. Learn about new escape methods for the latest Docker versions and intriguing kernel object manipulations. Discover QEMU escape technology, including memory layout analysis, security vulnerabilities in QEMU device emulators, and exploitation methods. Gain insights into virtualization and cloud platform security from experts Shengping Wang and Xu Liu as they present never-before-published material on escaping virtual environments and controlling host systems.

Syllabus

Intro
SPEAKER BIO
KEY TECHNIQUES
VULUNERABILITY
ATTACK DOCKER
NAME SPACES
TASK_STRUCT
CHROOT
ESCAPE POINT
GET FS_STRUCT
CHANGE FS_STRUCT
SWITCT NSPROXY
VIDEO
KVM-QEMU
KEY POINTS
QEMU MEMORY ON HOST
QEMU MEMORY MAPPING
GUEST OS MEMORY
EMULATED DEVICE
OTHER METHODS
EIP CONTROL ASM
MORE EIP CONTROL WAYS
VM EXPLOIT STEPS
BYPASS DEP&ASLR
CVE-2015-7504
OTHER EXPLOIT WAYS . SYS CALL
ATTACK DEMO

Taught by

Hack In The Box Security Conference

Reviews

Start your review of Escape From The Docker KVM QEMU Machine

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.