Hypervisor Internals 1

Unravel the internals of Hypervisors to support reverse engineering, vulnerability research or hypervisor development.

Hypervisor Internals 1 | Signal Labs | Advanced Offensive Cybersecurity Training | Self-Paced Trainings | Live Trainings | Virtual Trainings | Custom Private Trainings for Business

Dive into modern x86-64 hypervisors via a mixture of reverse engineering, source code review and our own custom code.

Who should take this course?

This course is applicable for those who want to gain a working understanding of Hypervisors to the point of being comfortable navigating their source code, reverse engineering them for vulnerability research or feature identification, or to start their own hypervisor development project.

We not only walkthrough the designs of hypervisors at a high-level (mapping out their capabilities including supporting code that leverages hypervisors such as VMBUS and other backdoor or guest<->host communication methods), we also dive into low-level implementation details through direct methods such as reverse engineering, and through emulation and hypervisor based dynamic analysis where we leverage both hypervisor debugging capabilities and custom modifications to emulators such as Bochs or Qemu.

This course is the first in its series and assumes no prior hypervisor knowledge. The hypervisors we analyze will be x86-64 based and cover both Type 1 & 2 hypervisors, though many of the design concepts also apply to other architectures.

Course Syllabus

  • High-Level Overview

  • Open Source Analysis (KVM)

  • Open Source Analysis Pt.2 (Other)

  • N-Day VM Escape Research

  • Bug Identification & Attack Plan (Custom OS)

  • Mapping the Vulnerability Trigger Steps

  • Custom Rust-Based OS Development & Triggering the Bug

  • Debugging Type-2 Hypervisors w/ Kernel Debugging

  • Discovering an N-day via Fuzzing

  • Full-System Emulation for Dynamic Analysis

  • Nested Virtualization & Hypervisor Debugging for Dynamic Analysis

  • Hyper-V, RE Headless Scripting & VM-Exit Handler Analysis

  • VMware Unpacking & Capability Mapping

  • VMBUS & Backdoor Communications

  • Designing Our Own VMBUS Client Implementation

  • Interrupts, GPAs, Hypercalls

Walkthrough not only the high-level designs of hypervisors but also the low-level logic and hardware primitives that drive them, utilizing our own custom code for dynamic analysis, including creating a custom OS from scratch in Rust and triggering a hypervisor N-day.

Course Benefits

Beginner & Advanced Content with Live Demonstrations

Community Environment to Engage in Discussions with Peers & Instructor

Live Q&A Sessions & Ongoing Support After the Course

Frequently Updated Content with the Latest Techniques & Tools

Custom Code Developed by Signal Labs for Students

(Optional) Assessments & Completion Certificates

What makes Signal Labs self-paced courses different?

A firsthand look at our innovative self-paced course content.

Select Your Training Method

Self-Paced

Self-Paced Training

$600.00

  • Multiple hands-on exercises for each section.
  • Targets common hypervisors incl. Hyper-V.
  • Advanced custom tooling, including custom OS development.
  • Modify emulators and work with nested hypervisors for analysis.
  • Community pages to engage with discussions between peers & instructor.
  • Course Materials: Recorded Content, Code Files.

*For larger business teams, reach out for custom packages.

Christopher Vella | Signal Labs | Advanced Offensive Cybersecurity Training | Self-Paced Trainings | Live Trainings | Virtual Trainings | Custom Private Trainings for Business

Instructor

Christopher Vella has extensive experience with hypervisors, both with custom hypervisor development and vulnerability research, including discovering multiple critical 0-days against Hyper-V while on Microsoft’s MORSE team.

Christopher also has advanced knowledge of Windows internals, kernel development, reverse engineering and emulator development, having contributed to bug fixes in virtualization emulation code for Bochs and developing hypervisors for stealth full-system debugging.

Strong Signals

Stay Connected

We'll let you know when our next live training is scheduled.

Stay Connected

We'll let you know when our next live training is scheduled.

Stay Connected

We'll let you know when our next live training is scheduled.

Stay Connected

We'll let you know when our next live training is scheduled.