ycliper

Популярное

Музыка Кино и Анимация Автомобили Животные Спорт Путешествия Игры Юмор

Интересные видео

2025 Сериалы Трейлеры Новости Как сделать Видеоуроки Diy своими руками

Топ запросов

смотреть а4 schoolboy runaway турецкий сериал смотреть мультфильмы эдисон
Скачать

Battle Of The SKM And IUM: How Windows 10 Rewrites OS Architecture

Автор: Black Hat

Загружено: 2015-12-27

Просмотров: 12933

Описание: by Alex Ionescu

In Windows 10, Microsoft is introducing a radical new concept to the underlying OS architecture, and likely the biggest change to the NT design since the decision to move the GUI in kernel-mode.

In this new model, the Viridian Hypervisor Kernel now becomes a core part of the operating system and implements Virtual Secure Machines (VSMs) by loading a true microkernel - a compact (200kb) NT look-alike with its own drivers called the Secure Kernel Mode (SKM) environment, which then uses the Hypervisor to hook and intercept execution of the true NT kernel. This creates a new paradigm where the NT Kernel, executing in Ring 0, now runs below the Secure Kernel, at Ring ~0 (called Virtual Trust Level 1).

But it doesn't stop there - as the Ring 0 NT kernel now has the ability to not only create standard Ring 3 user-mode applications, but also Ring ~3 applications (or Virtual Trust Level 0) that run in Isolated User Mode (IUM). Because VTLs are all more privileged than Ring 0, this now creates a model where a user-mode application running inside a VSM now has data and rights that even the kernel itself cannot modify. Why go through all this trouble? Because it seems like the hottest thing these days is Pass-the-Hash, and attacks must seemingly be mitigated at all costs. And even in Windows 8.1, an attacker with the permissions to load a kernel driver can bypass the existing mitigations (and Mimikatz is signed!). With VTLs, now even the most privileged attacker is only as privileged as the hypervisor will allow it - never able to truly read the hash date that is stored in the secure partition.

How "secure" is this new model really? And what prevents a malicious application from running in such a secure mode to begin with?

Не удается загрузить Youtube-плеер. Проверьте блокировку Youtube в вашей сети.
Повторяем попытку...
Battle Of The SKM And IUM: How Windows 10 Rewrites OS Architecture

Поделиться в:

Доступные форматы для скачивания:

Скачать видео

  • Информация по загрузке:

Скачать аудио

Похожие видео

Windows Notification Facility: Peeling the Onion of the Most Undocumented Kernel Attack Surface Yet

Windows Notification Facility: Peeling the Onion of the Most Undocumented Kernel Attack Surface Yet

Taking Event Correlation With You

Taking Event Correlation With You

Windows 10 Kernel Mitigations and Exploitation w/ Jaime Geiger & Stephen Sims - SANS HackFest Summit

Windows 10 Kernel Mitigations and Exploitation w/ Jaime Geiger & Stephen Sims - SANS HackFest Summit

Windows Debugging and Troubleshooting

Windows Debugging and Troubleshooting

Windows Kernel Graphics Driver Attack Surface

Windows Kernel Graphics Driver Attack Surface

The Memory Sinkhole - Unleashing An X86 Design Flaw Allowing Universal Privilege Escalation

The Memory Sinkhole - Unleashing An X86 Design Flaw Allowing Universal Privilege Escalation

Mysteries of Memory Management Revealed (Part 1/2)

Mysteries of Memory Management Revealed (Part 1/2)

Alex Ionescu - The

Alex Ionescu - The "Bird" That Killed Arbitrary Code Guard - Ekoparty 2017

The Linux Kernel Hidden Inside Windows 10

The Linux Kernel Hidden Inside Windows 10

Pavel Yosifovich — Windows 10 internals for .NET developers

Pavel Yosifovich — Windows 10 internals for .NET developers

Как Ubuntu Предала Linux - Вся Правда о Взлёте и Падении Canonical

Как Ubuntu Предала Linux - Вся Правда о Взлёте и Падении Canonical

LLM и GPT - как работают большие языковые модели? Визуальное введение в трансформеры

LLM и GPT - как работают большие языковые модели? Визуальное введение в трансформеры

Вся IT-база в ОДНОМ видео: Память, Процессор, Код

Вся IT-база в ОДНОМ видео: Память, Процессор, Код

Exploiting the DRAM Rowhammer Bug to Gain Kernel Privileges

Exploiting the DRAM Rowhammer Bug to Gain Kernel Privileges

История Linux и UNIX! Кто породил ВСЕ современные системы!

История Linux и UNIX! Кто породил ВСЕ современные системы!

КАК УСТРОЕН TCP/IP?

КАК УСТРОЕН TCP/IP?

Social Engineering The Windows Kernel: Finding And Exploiting Token Handling Vulnerabilities

Social Engineering The Windows Kernel: Finding And Exploiting Token Handling Vulnerabilities

Windows Offender: Reverse Engineering Windows Defender's Antivirus Emulator

Windows Offender: Reverse Engineering Windows Defender's Antivirus Emulator

SyScan'14 Singapore: All About The Rpc, Lrpc, Alpc, And Lpc In Your Pc By Alex Ionescu

SyScan'14 Singapore: All About The Rpc, Lrpc, Alpc, And Lpc In Your Pc By Alex Ionescu

Сисадмины больше не нужны? Gemini настраивает Linux сервер и устанавливает cтек N8N. ЭТО ЗАКОННО?

Сисадмины больше не нужны? Gemini настраивает Linux сервер и устанавливает cтек N8N. ЭТО ЗАКОННО?

© 2025 ycliper. Все права защищены.



  • Контакты
  • О нас
  • Политика конфиденциальности



Контакты для правообладателей: [email protected]