Главная
Study mode:
on
1
Intro
2
SPEAKER BIO
3
KEY TECHNIQUES
4
VULUNERABILITY
5
ATTACK DOCKER
6
NAME SPACES
7
TASK_STRUCT
8
CHROOT
9
ESCAPE POINT
10
GET FS_STRUCT
11
CHANGE FS_STRUCT
12
SWITCT NSPROXY
13
VIDEO
14
KVM-QEMU
15
KEY POINTS
16
QEMU MEMORY ON HOST
17
QEMU MEMORY MAPPING
18
GUEST OS MEMORY
19
EMULATED DEVICE
20
OTHER METHODS
21
EIP CONTROL ASM
22
MORE EIP CONTROL WAYS
23
VM EXPLOIT STEPS
24
BYPASS DEP&ASLR
25
CVE-2015-7504
26
OTHER EXPLOIT WAYS . SYS CALL
27
ATTACK DEMO
Description:
Explore Docker and KVM-QEMU escape techniques in this comprehensive conference talk from Hack In The Box Security Conference. Dive into Docker's implementation principles, Linux kernel vulnerability exploitation, and container escape technologies. Learn about new escape methods for the latest Docker versions and intriguing kernel object manipulations. Discover QEMU escape technology, including memory layout analysis, security vulnerabilities in QEMU device emulators, and exploitation methods. Gain insights into virtualization and cloud platform security from experts Shengping Wang and Xu Liu as they present never-before-published material on escaping virtual environments and controlling host systems.

Escape From The Docker KVM QEMU Machine

Hack In The Box Security Conference
Add to list
0:00 / 0:00