Популярное

Музыка Кино и Анимация Автомобили Животные Спорт Путешествия Игры Юмор

Интересные видео

2025 Сериалы Трейлеры Новости Как сделать Видеоуроки Diy своими руками

Топ запросов

смотреть а4 schoolboy runaway турецкий сериал смотреть мультфильмы эдисон
dTub
Скачать

DEF CON 22 - Kallenberg and Kovah - Extreme Privilege Escalation On Windows 8/UEFI Systems

Автор: DEFCONConference

Загружено: 2015-01-06

Просмотров: 11219

Описание:

Slides Here: https://defcon.org/images/defcon-22/d...

Additional Materials available here: https://defcon.org/images/defcon-22/d...

Extreme Privilege Escalation On Windows 8/UEFI Systems
Corey Kallenberg MITRE
Xeno Kovah MITRE
It has come to light that state actors install implants in the BIOS. Let no one ever again question whether BIOS malware is practical or present in the wild. However, in practice attackers can install such implants without ever having physical access to the box. Exploits against the BIOS can allow an attacker to inject arbitrary code into the platform firmware. This talk will describe two such exploits we developed against the latest UEFI firmware.

The UEFI specification has more tightly coupled the bonds of the operating system and the platform firmware by providing the well-defined "runtime services" interface between the OS and the firmware. This interface is more expansive than the interface that existed in the days of conventional BIOS, which has inadvertently increased the attack surface against the platform firmware. Furthermore, Windows 8 has introduced APIs that allow accessing this UEFI interface from a userland process. Vulnerabilities in this interface can potentially allow a userland process to escalate its privileges from "ring 3" all the way up to that of the platform firmware, which includes permanently attaining control of the very-powerful System Management Mode (SMM).

This talk will disclose two vulnerabilities that were discovered in the Intel provided UEFI reference implementation, and detail the unusual techniques needed to successfully exploit them.

Corey Kallenberg is a security researcher for The MITRE Corporation who has spent several years investigating operating system and firmware security on Intel computers. In 2012 he coauthored work presented at DEF CON and IEEE S&P on using timing based attestation to detect Windows kernel hooks. In 2013 he helped discover critical problems with current implementations of the Trusted Computing Group's "Static Root of Trust for Measurement" and co-presented this work at NoSuchCon and Blackhat USA. Later, he discovered several vulnerabilities which allowed bypassing of "signed BIOS enforcement" on a number of systems, allowing an attacker to make malicious modifications to the platform firmware. These attacks were presented at EkoParty, HITB, and PacSec. Recently, Corey has presented attacks against the UEFI "Secure Boot" feature. Corey is currently continuing to research the security of UEFI and the Intel architecture.

twitter: @coreykal

Xeno Kovah is a Lead InfoSec Engineer at The MITRE Corporation, a non-profit company that runs 6 federally funded research and development centers (FFRDCs) as well as manages CVE. He is the team lead for the BIOS Analysis for Detection of Advanced System Subversion project. On the predecessor project, Checkmate, he investigated kernel/userspace memory integrity verification & timing-based attestation. Both projects have a special emphasis on how to make it so that the measurement agent can't just be made to lie by an attacker. Xeno is also the founder and leading contributor to OpenSecurityTraining.info.

twitter: @xenokovah

DEF CON 22 - Kallenberg and Kovah - Extreme Privilege Escalation On Windows 8/UEFI Systems

Поделиться в:

Доступные форматы для скачивания:

Скачать видео mp4

  • Информация по загрузке:

Скачать аудио mp3

Похожие видео

DEF CON 22 - Panel - Summary of Attacks Against BIOS and Secure Boot

DEF CON 22 - Panel - Summary of Attacks Against BIOS and Secure Boot

DEF CON 22 - Felix Leder - NinjaTV - Increasing Your Smart TV’s IQ Without Bricking It

DEF CON 22 - Felix Leder - NinjaTV - Increasing Your Smart TV’s IQ Without Bricking It

DEF CON 26 - zerosum0x0 - Demystifying MS17 010 Reverse Engineering the ETERNAL Exploits

DEF CON 26 - zerosum0x0 - Demystifying MS17 010 Reverse Engineering the ETERNAL Exploits

DEF CON 22 - Grant Bugher - Detecting Bluetooth Surveillance Systems

DEF CON 22 - Grant Bugher - Detecting Bluetooth Surveillance Systems

Analyzing UEFI BIOSes from Attacker & Defender Viewpoints

Analyzing UEFI BIOSes from Attacker & Defender Viewpoints

Цепи Маркова — математика предсказаний [Veritasium]

Цепи Маркова — математика предсказаний [Veritasium]

Top privilege escalation techniques - bug bounty case study

Top privilege escalation techniques - bug bounty case study

Правительство США запретит устройства TP-Link: взлом китайского Wi-Fi-роутера в режиме реального ...

Правительство США запретит устройства TP-Link: взлом китайского Wi-Fi-роутера в режиме реального ...

DEF CON 22 - Dr. Philip Polstra -  Am I Being Spied On?

DEF CON 22 - Dr. Philip Polstra - Am I Being Spied On?

DEF CON 25 - Saif El Sherei - Demystifying Windows Kernel Exploitation by Abusing GDI Objects

DEF CON 25 - Saif El Sherei - Demystifying Windows Kernel Exploitation by Abusing GDI Objects

DEF CON 24: Bluetooth Sniffing, Black Badges, DEF CON DarkNet and More! - Hak5 2025

DEF CON 24: Bluetooth Sniffing, Black Badges, DEF CON DarkNet and More! - Hak5 2025

Как устроен PHP 🐘: фундаментальное знание для инженеров

Как устроен PHP 🐘: фундаментальное знание для инженеров

Скрытый шпион вашего компьютера с Windows 11: тёмная правда о чипах TPM

Скрытый шпион вашего компьютера с Windows 11: тёмная правда о чипах TPM

The Memory Sinkhole - Unleashing An X86 Design Flaw Allowing Universal Privilege Escalation

The Memory Sinkhole - Unleashing An X86 Design Flaw Allowing Universal Privilege Escalation

КАК УСТРОЕН TCP/IP?

КАК УСТРОЕН TCP/IP?

DEF CON 22 - Dominic White and Ian de Villiers - Manna from Heaven

DEF CON 22 - Dominic White and Ian de Villiers - Manna from Heaven

DEF CON 22 - Robert Rowley - Detecting and Defending Against a Surveillance State

DEF CON 22 - Robert Rowley - Detecting and Defending Against a Surveillance State

Извлечение прошивки китайской IP-камеры — основы пентестинга в Интернете вещей

Извлечение прошивки китайской IP-камеры — основы пентестинга в Интернете вещей

Теренс Тао о том, как Григорий Перельман решил гипотезу Пуанкаре | Лекс Фридман

Теренс Тао о том, как Григорий Перельман решил гипотезу Пуанкаре | Лекс Фридман

Интернет через Dial-up без АТС

Интернет через Dial-up без АТС

© 2025 dtub. Все права защищены.



  • Контакты
  • О нас
  • Политика конфиденциальности



Контакты для правообладателей: [email protected]