Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Kernel Exploit Hunting and Mitigation

Hack In The Box Security Conference via YouTube

Overview

Explore kernel exploit hunting and mitigation techniques in this conference talk from the Hack In The Box Security Conference. Dive into the world of cyberwarfare and multi-level attacks, focusing on Windows kernel vulnerabilities exploited by APT attackers and botnet operators. Examine real-world examples of malware families utilizing kernel exploits, including Dyre, Turla, and Necurs. Learn how to proactively discover effective samples with kernel exploits through dynamic analysis systems. Gain insights into analyzing kernel exploits that bypass HIPS detection and prevention methodologies. Witness a demonstration of a prototype tool for effective kernel exploit mitigation. Benefit from the speakers' extensive experience in malware analysis, reverse engineering, and Windows kernel vulnerability research.

Syllabus

Introduction
Wayne Low
Agenda
User Account Control
Primitive
Limitations
Criminal Exploits
How To Identify What Web
Case Study
Despite
Despite Workflow
EOP Explore
Integrity Level

Taught by

Hack In The Box Security Conference

Reviews

Start your review of Kernel Exploit Hunting and Mitigation

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.