Google Data Analytics, IBM AI & Meta Marketing — All in One Subscription
Learn EDR Internals: Research & Development From The Masters
Overview
Google, IBM & Meta Certificates — All 10,000+ Courses at 40% Off
One annual plan covers every course and certificate on Coursera. 40% off for a limited time.
Get Full Access
Explore a 40-minute Black Hat presentation where security researchers Junoh Lee and Gwangun Jung demonstrate their VMware full-chain exploitation technique used at Pwn2Own 2024. Gain in-depth understanding of two critical VMware vulnerabilities and their exploitation methods, along with specialized tips for targeting VMware in modern Windows environments. Learn about a Windows Kernel Elevation of Privilege vulnerability and discover new exploitation primitives that bypass the latest Windows 24H2 security mitigations. See how these three vulnerabilities were chained together to create a comprehensive attack, and understand the key insights and future security implications of this research.
Syllabus
Guest Revolution: Chaining 3-bugs to compromise the Windows kernel from the VMware guest
Taught by
Black Hat