Главная
Study mode:
on
1
Introduction
2
HyperV Architecture
3
Physical Memory Terminology
4
HyperV Components
5
Guest Partitions
6
Least Privilege
7
Componentized Attack Surface
8
Hypervisor
9
Kernel Mode
10
User Mode
11
VM Bus
12
Attack Surface
13
VM Bus Pipes
14
IO Entry Points
15
Joe Slides
16
VM Switch
17
VPCI
18
VMBus
19
Communication
20
intercepted IO
21
Closing thoughts
Description:
Explore the architecture and vulnerabilities of Hyper-V virtualization technology in this 47-minute Black Hat conference talk. Delve into the complexities of virtualization stacks as a foundation for platform and cloud security. Examine the potential risks associated with guest-to-host exploits. Learn about Hyper-V components, guest partitions, least privilege principles, and the componentized attack surface. Investigate the Hypervisor's kernel and user modes, VM Bus, attack surfaces, VM Bus pipes, and IO entry points. Analyze VM Switch, VPCI, and VMBus communication. Gain insights into the intercepted IO process and reflect on the implications for virtualization security.

A Dive into Hyper-V Architecture and Vulnerabilities

Black Hat
Add to list
0:00 / 0:00