Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Guest Revolution: Chaining 3 Bugs to Compromise the Windows Kernel from the VMware Guest

Black Hat via YouTube

Overview

Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Explore a 40-minute Black Hat presentation where security researchers Junoh Lee and Gwangun Jung demonstrate their VMware full-chain exploitation technique used at Pwn2Own 2024. Gain in-depth understanding of two critical VMware vulnerabilities and their exploitation methods, along with specialized tips for targeting VMware in modern Windows environments. Learn about a Windows Kernel Elevation of Privilege vulnerability and discover new exploitation primitives that bypass the latest Windows 24H2 security mitigations. See how these three vulnerabilities were chained together to create a comprehensive attack, and understand the key insights and future security implications of this research.

Syllabus

Guest Revolution: Chaining 3-bugs to compromise the Windows kernel from the VMware guest

Taught by

Black Hat

Reviews

Start your review of Guest Revolution: Chaining 3 Bugs to Compromise the Windows Kernel from the VMware Guest

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.