Overview
This course teaches learners how to bypass various kernel protections and provides mitigation strategies. The course covers analyzing exploits that bypass KASLR using flexible objects in the Linux kernel, extending the concept to elastic objects, and demonstrating a general exploitation approach. The teaching method involves practical demonstrations and theoretical explanations. This course is intended for cybersecurity professionals, ethical hackers, and individuals interested in kernel security.
Syllabus
A General Approach to Bypassing Many Kernel Protections and its Mitigation
Taught by
Black Hat