Discovering 20 Year Old Vulnerabilities in Modern Windows Kernel

Subscribers:
5,970
Published on ● Video Link: https://www.youtube.com/watch?v=V4vdTw8mxko



Duration: 23:40
4 views
0


Black Hat - Europe - 2020
Hacking conference
#hacking, #hackers, #infosec, #opsec, #IT, #security




Other Videos By All Hacking Cons


2021-12-23Black Hat USA 1999 Ed Gerck Overview of Certification systems x509, CA, PGP and SKIP
2021-12-23Black Hat USA 1999 Base Security or lack thereof and our Friends in Redmond
2021-12-23Black Hat USA 1999 Jon David Putting Intrusion Detection into Intrusion Detection Systems
2021-12-23Black Hat USA 1999 Scott Culp Building a Security Response Process
2021-12-23Black Hat USA 1999 Batz Security Issues Affecting Internet Transit Points and Backbone Providers
2021-12-23Black Hat USA 1999 Brent Huston Appliance Firewalls a detailed review
2021-12-23Black Hat USA 1999 Greg Hoglund 1000 Hackers in a box Failings of Security Scanners
2021-12-23Black Hat USA 1999 Padgett Peterson Overlooked Local Attack Techniques
2021-12-22Design Pitfalls in Commercial Mini Programs on Android and iOS
2021-12-22Graph Convolutional Network Based Suspicious Communication Pair Estimation for Industrial Control
2021-12-22Discovering 20 Year Old Vulnerabilities in Modern Windows Kernel
2021-12-22Jack in the Cache A New Code injection Technique through Modifying X86 to ARM Translation Cache
2021-12-22Shield with Hole New Security Mitigation Helps Us Escape Chrome Sandbox to Exfiltrate User Privacy
2021-12-22Hacking Government Cybersecurity
2021-12-22Effective Vulnerability Discovery with Machine Learning
2021-12-22LadderLeak Breaking ECDSA with Less than One Bit of Nonce Leakage
2021-12-22Story of Jailbreaking iOS 13 Black Hat - Europe - 2020
2021-12-22efiXplorer Hunting for UEFI Firmware Vulnerabilities at Scale with Automated Static Analysis
2021-12-22Hermes Attack Steal DNN Models In AI Privatization Deployment Scenarios
2021-12-22Light Commands Hacking Voice Assistants with Lasers
2021-12-22The Hunt for Major League IoT ICS Threats A Deep Dive into IoT Threat Terrain



Tags:
data
hacker
security
computer
cyber
internet
technology
hacking
attack
digital
virus
information
hack
online
crime
password
code
web
concept
thief
protection
network
scam
fraud
malware
secure
identity
criminal
phishing
software
access
safety
theft
system
firewall
communication
business
privacy
binary
account
spy
programmer
program
spyware
hacked
hacking conference
conference
learn
how to
2022
2021
cybersecurity
owned
break in
google
securing
exploit
exploitation
recon
social engineering