Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Ring 0 to Ring -1 Exploitation with Hyper-V IPC

SyScan360 via YouTube

Overview

Explore advanced exploitation techniques in a conference talk that delves into Ring 0 to Ring -1 exploitation using Hyper-V IPC. Gain insights into the intricacies of hypervisor vulnerabilities and learn how to leverage Inter-Process Communication (IPC) mechanisms within Hyper-V to escalate privileges from kernel mode to the hypervisor level. Discover potential attack vectors, understand the security implications of virtualization technologies, and examine real-world examples of exploiting Hyper-V IPC vulnerabilities. Enhance your knowledge of low-level system architecture, virtualization security, and advanced exploitation methodologies in this hour-long presentation from SyScan'15 Singapore.

Syllabus

SyScan'15 Singapore: Ring 0 to Ring -1 Exploitation with Hyper-V IPC

Taught by

SyScan360

Reviews

Start your review of Ring 0 to Ring -1 Exploitation with Hyper-V IPC

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.