Главная
Study mode:
on
1
Introduction
2
VMware Architecture
3
Backdoor
4
PCI
5
Scorecard
6
HDFS
7
Host Open
8
Ghost In The Shell
9
VMware Host Open
10
Metasploit Module
11
Dependencies
12
Demo
13
Deuse After Free
14
Conclusion
Description:
Explore VMware security vulnerabilities and escape techniques in this 47-minute conference talk from Derbycon 7. Dive into VMware architecture, backdoor PCI, and the Host Open exploit. Learn about the Ghost In The Shell technique, Metasploit module development, and a Deuse After Free attack. Gain insights into VMware escapology and hypervisor security through detailed explanations, demonstrations, and a comprehensive analysis of potential attack vectors.

VMware Escapology - How to Houdini The Hypervisor

Add to list