Get a Pentest and security assessment of your IT network.

News

Excellent VM detection and breakout presentation

The majority of VMs “hook” interrupts and APIs on the host operating system. Malware can walk the interrupt vector table or VM interface subroutines, find the VM hooks, and insert itself one call above or replace a sub-routine. With just a little digging, you too can find the weaknesses (if you’re a threat modeler) SANS presentation covers some other techniques, as well as, discusses some of the items that are relevant to break out attacks.”]

Source: https://www.csoonline.com/article/2632990/excellent-vm-detection-and-breakout-presentation.html

Related posts
News

Ashley Madison 2.0 Hackers Leak 20GB Data Dump, Including CEO's Emails

News

Art of Twitter account hacking

News

Take note, next week update Adobe Reader and Acrobat to fix critical flaws

News

Linux bug leaves 1.4 billion Android users vulnerable to hijacking attacks