Getting Started with Debugging Hyper-V for Vulnerability Research, Part 2.

Описание к видео Getting Started with Debugging Hyper-V for Vulnerability Research, Part 2.

We recently had on Daniel Fernandez, one of my co-authors of Gray Hat Hacking 6th Ed... In this continuation on that topic area, join me with special guest "Alan Sguigna" from ASSET InterTech. JTAG debugging on affordable, commercially available Intel targets is now available for the first time. Low-level VMM breakpoints, Intel Processor Trace, Architectural Event Trace and other features will be demonstrated for Hyper-V/ Secure Kernel/ VBS vulnerability research and debugging.

Комментарии

Информация по комментариям в разработке