Learn AI, Data Science & Business — Earn Certificates That Get You Hired
MIT Sloan: Lead AI Adoption Across Your Organization — Not Just Pilot It
Overview
Google, IBM & Meta Certificates — All 10,000+ Courses at 40% Off
One annual plan covers every course and certificate on Coursera. 40% off for a limited time.
Get Full Access
Dive into the advanced techniques of Direct Kernel Object Manipulation (DKOM) in this Black Hat conference talk presented by Jamie Butler. Explore the intricacies of manipulating Windows kernel objects to achieve stealth and evade detection. Learn about the potential security implications and countermeasures associated with DKOM techniques in the Windows 2004 environment. Gain insights into how attackers can leverage these methods to hide processes, alter system behavior, and bypass security mechanisms. Understand the challenges faced by security professionals in detecting and mitigating DKOM-based threats.
Syllabus
Black Hat Windows 2004 - DKOM (Direct Kernel Object Manipulation)
Taught by
Black Hat