Analysis of the Attack Surface of Windows 10 Virtualization-Based Security

Analysis of the Attack Surface of Windows 10 Virtualization-Based Security

Getting Started with Debugging Hyper-V for Vulnerability ResearchПодробнее

Getting Started with Debugging Hyper-V for Vulnerability Research

Close Encounters of the Advanced Persistent Kind: Leveraging Rootkits for Post-ExploitationПодробнее

Close Encounters of the Advanced Persistent Kind: Leveraging Rootkits for Post-Exploitation

[BSL2022] Windows kernel rootkits for red teams - André LimaПодробнее

[BSL2022] Windows kernel rootkits for red teams - André Lima

eBPF ELFs JMPing Through the WindowsПодробнее

eBPF ELFs JMPing Through the Windows

Analysis of the Attack Surface of Windows 10 Virtualization Based SecurityПодробнее

Analysis of the Attack Surface of Windows 10 Virtualization Based Security

Breaking VSM by Attacking SecureKernelПодробнее

Breaking VSM by Attacking SecureKernel

Windows 10: Permanently disable VBS (Virtualization-based security)? (3 Solutions!!)Подробнее

Windows 10: Permanently disable VBS (Virtualization-based security)? (3 Solutions!!)

Windows 10 Kernel Mitigations and Exploitation w/ Jaime Geiger & Stephen Sims - SANS HackFest SummitПодробнее

Windows 10 Kernel Mitigations and Exploitation w/ Jaime Geiger & Stephen Sims - SANS HackFest Summit

Kernel Mode Threats and Practical DefensesПодробнее

Kernel Mode Threats and Practical Defenses

Windows Notification Facility: Peeling the Onion of the Most Undocumented Kernel Attack Surface YetПодробнее

Windows Notification Facility: Peeling the Onion of the Most Undocumented Kernel Attack Surface Yet

A Retrospective Case Study of VMware Guest-to-Host Escape VulnerabilitiesПодробнее

A Retrospective Case Study of VMware Guest-to-Host Escape Vulnerabilities

Real life hacks for Windows and Office... and how to stop them (Microsoft Ignite)Подробнее

Real life hacks for Windows and Office... and how to stop them (Microsoft Ignite)

Black Hat USA 2016 Analysis of the Attack Surface of Windows 10 Virtualization Based SecurityПодробнее

Black Hat USA 2016 Analysis of the Attack Surface of Windows 10 Virtualization Based Security

BSides Rochester 2018 - Virtualization Based Security Strengths and WeaknessesПодробнее

BSides Rochester 2018 - Virtualization Based Security Strengths and Weaknesses

[2017] Nested Virtualization: Hyper-V on KVM by Ladi ProsekПодробнее

[2017] Nested Virtualization: Hyper-V on KVM by Ladi Prosek

Into the Core: In-Depth Exploration of Windows 10 IoT CoreПодробнее

Into the Core: In-Depth Exploration of Windows 10 IoT Core

Windows Kernel Graphics Driver Attack SurfaceПодробнее

Windows Kernel Graphics Driver Attack Surface

Black Hat EU 2013 - The Sandbox Roulette: Are You Ready For The Gamble?Подробнее

Black Hat EU 2013 - The Sandbox Roulette: Are You Ready For The Gamble?

Популярное