• XSS.stack #1 – первый литературный журнал от юзеров форума

Видео [GreHack 2024] Attacking hypervisors - A practical case

weaver

31 c0 bb ea 1b e6 77 66 b8 88 13 50 ff d3
Забанен
Регистрация
19.12.2018
Сообщения
3 301
Решения
11
Реакции
4 622
Депозит
0.0001
Пожалуйста, обратите внимание, что пользователь заблокирован
Описание
Last year, in the talk Virtualization from an attacker Point-Of-View, Corentin BAYET presented the attack surface exposed by hypervisors, with a quick analysis of a few known (and patched) bugs.

Earlier this year, the REverse Tactics team participated at Pwn2Own Vancouver 2024 and escaped from VirtualBox during the contest, scoring a full win.

Building on last year’s exploration of hypervisor security, this talk focuses specifically on VirtualBox’s internals and architecture. The speaker details his journey on how he quickly found bugs in the huge code base.

More specifically, this talk details how he conducted his research, how he chose on what to focus, the tools he used, and the mistakes he made.

Additionally, he provides an in-depth analysis of how the exploit was constructed for a real-world escape scenario. This includes detailed steps and techniques used to bypass VirtualBox’s and Windows mitigations.

Слайды
https://www.reversetactics.com/docs/conf/2024/202411_grehack_AttackingHypervisors.pdf

Видео
 


Напишите ответ...
  • Вставить:
Прикрепить файлы
Верх