Популярное

Музыка Кино и Анимация Автомобили Животные Спорт Путешествия Игры Юмор

Интересные видео

2025 Сериалы Трейлеры Новости Как сделать Видеоуроки Diy своими руками

Топ запросов

смотреть а4 schoolboy runaway турецкий сериал смотреть мультфильмы эдисон
dTub
Скачать

Social Engineering The Windows Kernel: Finding And Exploiting Token Handling Vulnerabilities

Автор: Black Hat

Загружено: 2015-12-29

Просмотров: 8987

Описание:

by James Forshaw

One successful technique in social engineering is pretending to be someone or something you're not and hoping the security guard who's forgotten their reading glasses doesn't look too closely at your fake ID. Of course there's no hyperopic guard in the Windows OS, but we do have an ID card, the Access Token which proves our identity to the system and let's us access secured resources. The Windows kernel provides simple capabilities to identify fake Access Tokens, but sometimes the kernel or other kernel-mode drivers are too busy to use them correctly. If a fake token isn't spotted during a privileged operation local elevation of privilege or information disclosure vulnerabilities can be the result. This could allow an attacker to break out of an application sandbox, elevate to administrator privileges, or even compromise the kernel itself. This presentation is about finding and then exploiting the incorrect handling of tokens in the Windows kernel as well as first and third party drivers. Examples of serious vulnerabilities, such as CVE-2015-0002 and CVE-2015-0062 will be presented. It will provide clear exploitable patterns so that you can do your own security reviews for these issues. Finally, I'll discuss some of the ways of exploiting these types of vulnerabilities to elevate local privileges.

Social Engineering The Windows Kernel: Finding And Exploiting Token Handling Vulnerabilities

Поделиться в:

Доступные форматы для скачивания:

Скачать видео mp4

  • Информация по загрузке:

Скачать аудио mp3

Похожие видео

BlueHat IL 2023 — Джеймс Форшоу — Аутентификация Windows

BlueHat IL 2023 — Джеймс Форшоу — Аутентификация Windows

An ACE Up the Sleeve: Designing Active Directory DACL Backdoors

An ACE Up the Sleeve: Designing Active Directory DACL Backdoors

Guarding Against Physical Attacks: The Xbox One Story — Tony Chen, Microsoft

Guarding Against Physical Attacks: The Xbox One Story — Tony Chen, Microsoft

The Memory Sinkhole - Unleashing An X86 Design Flaw Allowing Universal Privilege Escalation

The Memory Sinkhole - Unleashing An X86 Design Flaw Allowing Universal Privilege Escalation

Elevating your Windows Privileges Like a Boss! - Jake Williams

Elevating your Windows Privileges Like a Boss! - Jake Williams

Windows: Под прикрытием — от Hello World до режима ядра от разработчика Windows

Windows: Под прикрытием — от Hello World до режима ядра от разработчика Windows

Windows Internals Crash Course

Windows Internals Crash Course

VULNERABLE Kernel Drivers for Security Research

VULNERABLE Kernel Drivers for Security Research

Investigating Malware Using Memory Forensics - A Practical Approach

Investigating Malware Using Memory Forensics - A Practical Approach

Reverse Engineering and Bug Hunting on KMDF Drivers - Enrique Nissim at 44CON 2018

Reverse Engineering and Bug Hunting on KMDF Drivers - Enrique Nissim at 44CON 2018

DEF CON 25 - Morten Schenk - Taking Windows 10 Kernel Exploitation to the next level

DEF CON 25 - Morten Schenk - Taking Windows 10 Kernel Exploitation to the next level

SyScan'15 Singapore: A Link to the Past - Abusing Symbolic Links on Windows

SyScan'15 Singapore: A Link to the Past - Abusing Symbolic Links on Windows

Windows 10 Kernel Mitigations and Exploitation w/ Jaime Geiger & Stephen Sims - SANS HackFest Summit

Windows 10 Kernel Mitigations and Exploitation w/ Jaime Geiger & Stephen Sims - SANS HackFest Summit

Сисадмины больше не нужны? Gemini настраивает Linux сервер и устанавливает cтек N8N. ЭТО ЗАКОННО?

Сисадмины больше не нужны? Gemini настраивает Linux сервер и устанавливает cтек N8N. ЭТО ЗАКОННО?

James Forshaw - COM in Sixty Seconds! (well minutes more likely) @ Infiltrate 2017.mp4

James Forshaw - COM in Sixty Seconds! (well minutes more likely) @ Infiltrate 2017.mp4

SyScan'14 Singapore: All About The Rpc, Lrpc, Alpc, And Lpc In Your Pc By Alex Ionescu

SyScan'14 Singapore: All About The Rpc, Lrpc, Alpc, And Lpc In Your Pc By Alex Ionescu

DEF CON 26  - Alexei Bulazel - Reverse Engineering Windows Defenders Emulator

DEF CON 26 - Alexei Bulazel - Reverse Engineering Windows Defenders Emulator

Взлом WiFi за 60 секунд | Как взламывают Ваш роутер будьте осторожны!

Взлом WiFi за 60 секунд | Как взламывают Ваш роутер будьте осторожны!

BlueHat v18 || Return of the kernel rootkit malware (on windows 10)

BlueHat v18 || Return of the kernel rootkit malware (on windows 10)

Для Чего РЕАЛЬНО Нужен был ГОРБ Boeing 747?

Для Чего РЕАЛЬНО Нужен был ГОРБ Boeing 747?

© 2025 dtub. Все права защищены.



  • Контакты
  • О нас
  • Политика конфиденциальности



Контакты для правообладателей: infodtube@gmail.com