Skip to Content
Gray Hat Hacking: The Ethical Hacker's Handbook, Sixth Edition, 6th Edition
book

Gray Hat Hacking: The Ethical Hacker's Handbook, Sixth Edition, 6th Edition

by Allen Harper, Ryan Linn, Stephen Sims, Michael Baucom, Huascar Tejeda, Daniel Fernandez, Moses Frost
March 2022
Intermediate to advanced
752 pages
18h 47m
English
McGraw-Hill
Content preview from Gray Hat Hacking: The Ethical Hacker's Handbook, Sixth Edition, 6th Edition

CHAPTER 25

Inside Hyper-V

In this chapter, we cover the following topics:

•   Hyper-V’s architecture overview

•   Synthetic interfaces: MSRs, SynIC, hypercalls

•   VMBus communication

Microsoft Hyper-V has become an attractive target for security researchers. This hypervisor is not just used to run critical cloud infrastructure like Azure, but it is also the backbone of security features of the Windows OS, including Hypervisor-Protected Code Integrity (HVCI),1 Credential Guard,2 and Application Guard.3 It’s not surprising that Microsoft has special interest in securing Hyper-V, which is the reason why its Hyper-V bug bounty4 program awards researchers with amounts as much as US$250,000.

Hyper-V can be a challenging target for newcomers; ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Gray Hat Hacking The Ethical Hacker's Handbook, Fifth Edition, 5th Edition

Gray Hat Hacking The Ethical Hacker's Handbook, Fifth Edition, 5th Edition

Daniel Regalado, Shon Harris, Allen Harper, Chris Eagle, Jonathan Ness, Branko Spasojevic, Ryan Linn, Stephen Sims
Defensive Security Handbook, 2nd Edition

Defensive Security Handbook, 2nd Edition

Lee Brotherston, Amanda Berlin, William F. Reyor
Hands on Hacking

Hands on Hacking

Matthew Hickey, Jennifer Arcuri

Publisher Resources

ISBN: 9781264268955