![](https://ccweb.imgix.net/https%3A%2F%2Fwww.classcentral.com%2Fimages%2Ficon-black-friday.png?auto=format&ixlib=php-4.1.0&s=fe56b83c82babb2f8fce47a2aed2f85d)
Overview
![](https://ccweb.imgix.net/https%3A%2F%2Fwww.classcentral.com%2Fimages%2Ficon-black-friday.png?auto=format&ixlib=php-4.1.0&s=fe56b83c82babb2f8fce47a2aed2f85d)
This course aims to teach participants how to escalate privileges using the Windows Subsystem for Linux (WSL) by exploiting vulnerabilities in the system. The learning outcomes include understanding the attack surface provided by WSL, identifying vulnerabilities, and executing arbitrary code in Windows 10 kernels from a Linux executable. Participants will learn about reverse engineering, syscalls, memory corruption, and anti-exploitation techniques. The teaching method involves a talk that delves into the engineering project behind the vulnerability, demonstrating the process from vulnerability discovery to achieving arbitrary code execution. This course is intended for security researchers, vulnerability analysts, and individuals interested in understanding and exploiting system vulnerabilities.
Syllabus
Recon Brussels 2018 - Linux Vulnerabilities, Windows Exploits: Escalating Privileges with WSL
Taught by
Recon Conference