CHAPTER 25

Inside Hyper-V

In this chapter, we cover the following topics:

•   Hyper-V’s architecture overview

•   Synthetic interfaces: MSRs, SynIC, hypercalls

•   VMBus communication

Microsoft Hyper-V has become an attractive target for security researchers. This hypervisor is not just used to run critical cloud infrastructure like Azure, but it is also the backbone of security features of the Windows OS, including Hypervisor-Protected Code Integrity (HVCI),1 Credential Guard,2 and Application Guard.3 It’s not surprising that Microsoft has special interest in securing Hyper-V, which is the reason why its Hyper-V bug bounty4 program awards researchers with amounts as much as US$250,000.

Hyper-V can be a challenging target for newcomers; ...

Get Gray Hat Hacking: The Ethical Hacker's Handbook, Sixth Edition, 6th Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.