diff --git a/README.md b/README.md index 4c30804..4373b5a 100644 --- a/README.md +++ b/README.md @@ -55,7 +55,6 @@ - [Unikernel-like](#Unikernel-like) - [Exploitation Tools](#Exploitation-Tools) - [Xen Exploitation](#Xen-Exploitation) -- [Attacking Hypervisors](#Attacking-Hypervisors) - [VM-Hardening](#VM-Hardening) - [System](#System) - [Services](#Services) @@ -245,9 +244,6 @@ - [Advanced Exploitation: Xen Hypervisor VM Escape ](https://www.youtube.com/watch?v=6Ld5CiInrcI) - [Xen exploitation part 1: XSA-105, from nobody to root](https://blog.quarkslab.com/xen-exploitation-part-1-xsa-105-from-nobody-to-root.html) - [Xen exploitation part 2: XSA-148, from guest to host](https://blog.quarkslab.com/xen-exploitation-part-2-xsa-148-from-guest-to-host.html) - -## Attacking Hypervisors - - [Blackhat 2010 - Hacking the Hypervisor](https://www.youtube.com/watch?v=sTC9x5hYYFo&t=3s) - [Software Attacks on Hypervisor Emulation of Hardware](https://www.youtube.com/watch?v=c4DnlP88D2Y) - [[Slides]](https://www.troopers.de/downloads/troopers17/TR17_Attacking_hypervisor_through_hardwear_emulation.pdf) - [Lessons Learned from Eight Years of Breaking Hypervisors](https://www.youtube.com/watch?v=PJWJjb0uxXE) - [[Slides]](https://www.blackhat.com/docs/eu-14/materials/eu-14-Wojtczuk-Lessons-Learned-From-Eight-Years-Of-Breaking-Hypervisors.pdf)