Escape From The Docker KVM QEMU Machine
Hack In The Box Security Conference via YouTube
Finance Certifications Goldman Sachs & Amazon Teams Trust
Cybersecurity: Ethical Hacking Fundamentals - Self Paced Online
Overview
Syllabus
Intro
SPEAKER BIO
KEY TECHNIQUES
VULUNERABILITY
ATTACK DOCKER
NAME SPACES
TASK_STRUCT
CHROOT
ESCAPE POINT
GET FS_STRUCT
CHANGE FS_STRUCT
SWITCT NSPROXY
VIDEO
KVM-QEMU
KEY POINTS
QEMU MEMORY ON HOST
QEMU MEMORY MAPPING
GUEST OS MEMORY
EMULATED DEVICE
OTHER METHODS
EIP CONTROL ASM
MORE EIP CONTROL WAYS
VM EXPLOIT STEPS
BYPASS DEP&ASLR
CVE-2015-7504
OTHER EXPLOIT WAYS . SYS CALL
ATTACK DEMO
Taught by
Hack In The Box Security Conference