Overview
Explore Docker and KVM-QEMU escape techniques in this comprehensive conference talk from Hack In The Box Security Conference. Dive into Docker's implementation principles, Linux kernel vulnerability exploitation, and container escape technologies. Learn about new escape methods for the latest Docker versions and intriguing kernel object manipulations. Discover QEMU escape technology, including memory layout analysis, security vulnerabilities in QEMU device emulators, and exploitation methods. Gain insights into virtualization and cloud platform security from experts Shengping Wang and Xu Liu as they present never-before-published material on escaping virtual environments and controlling host systems.
Syllabus
Intro
SPEAKER BIO
KEY TECHNIQUES
VULUNERABILITY
ATTACK DOCKER
NAME SPACES
TASK_STRUCT
CHROOT
ESCAPE POINT
GET FS_STRUCT
CHANGE FS_STRUCT
SWITCT NSPROXY
VIDEO
KVM-QEMU
KEY POINTS
QEMU MEMORY ON HOST
QEMU MEMORY MAPPING
GUEST OS MEMORY
EMULATED DEVICE
OTHER METHODS
EIP CONTROL ASM
MORE EIP CONTROL WAYS
VM EXPLOIT STEPS
BYPASS DEP&ASLR
CVE-2015-7504
OTHER EXPLOIT WAYS . SYS CALL
ATTACK DEMO
Taught by
Hack In The Box Security Conference