Getting Started with Debugging Hyper-V for Vulnerability Research

Описание к видео Getting Started with Debugging Hyper-V for Vulnerability Research

Join me with my guest Daniel Fernandez, coauthor of Gray Hat Hacking, for a stream on how to get started with debugging the Hyper-V hypervisor for vulnerability research. With more and more controls leveraging Windows Virtualization Based Security (VBS), it is important to understand how to approach debugging Hyper-V, which resides in ring -1. When using controls such as Credential Guard, a secure kernel instance is running, along with Isolated User Mode (IUM) processes in a simultaneously running instance of Windows. How would you approach debugging this? Let's find out!

Join the Off By One Security Discord server:   / discord  

Комментарии

Информация по комментариям в разработке