Главная
Study mode:
on
1
Introduction
2
What is HyperV
3
VMSwitch
4
Vulnerability
5
Write out of bounds
6
Kernel thread stacks
7
Bypassing KSLR
8
Info Leak
9
What to do
10
First mitigation
11
Second mitigation
Description:
Explore offensive security research techniques for hardening Microsoft's Hyper-V virtualization stack in this 51-minute Black Hat conference talk. Dive into the importance of virtualization technology in modern computing security strategies and understand why Hyper-V is held to such high security standards, as evidenced by its $250,000 public bug bounty program. Learn about the structure of Hyper-V, including its VMSwitch component, and examine specific vulnerabilities such as write-out-of-bounds issues and kernel thread stack exploits. Discover methods for bypassing Kernel Stack Layout Randomization (KSLR) and how information leaks can be leveraged. Gain insights into effective mitigation strategies, with a focus on two key approaches presented by security researcher Jordan Rabet. Enhance your understanding of virtualization security and offensive research methodologies to better protect critical infrastructure.

Hardening Hyper-V through Offensive Security Research

Black Hat
Add to list
0:00 / 0:00