[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[Full-disclosure] OpenSecurityTraining Intel VT-x class
- To: full-disclosure@xxxxxxxxxxxxxxxxx
- Subject: [Full-disclosure] OpenSecurityTraining Intel VT-x class
- From: OST FD <opensectraining.fd@xxxxxxxxx>
- Date: Sat, 8 Sep 2012 14:30:10 -0400
We're now mirroring the content for David Weinstein's x86 virtualization
training class. This class teaches how to write a toy virtual machine
monitor (VMM) while showing how the famous BluePill and Vitriol attacks are
possible. The class is designed with particular focus on a Windows 7 x64
system, but towards the end it discusses creating a container for real-mode
(BIOS code) execution inside a toy Linux VMM (accessible via /dev/vmm once
the kernel module is loaded). The concepts are introduced first with some
historical perspective and fundamentals, followed by doing a deep technical
dive, and finally talking about detection techniques/countermeasures in the
last part.
http://OpenSecurityTraining.info/AdvancedX86-VTX.html
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/