ycliper

Популярное

Музыка Кино и Анимация Автомобили Животные Спорт Путешествия Игры Юмор

Интересные видео

2025 Сериалы Трейлеры Новости Как сделать Видеоуроки Diy своими руками

Топ запросов

смотреть а4 schoolboy runaway турецкий сериал смотреть мультфильмы эдисон
Скачать

Social Engineering The Windows Kernel: Finding And Exploiting Token Handling Vulnerabilities

Автор: Black Hat

Загружено: 2015-12-29

Просмотров: 9010

Описание: by James Forshaw

One successful technique in social engineering is pretending to be someone or something you're not and hoping the security guard who's forgotten their reading glasses doesn't look too closely at your fake ID. Of course there's no hyperopic guard in the Windows OS, but we do have an ID card, the Access Token which proves our identity to the system and let's us access secured resources. The Windows kernel provides simple capabilities to identify fake Access Tokens, but sometimes the kernel or other kernel-mode drivers are too busy to use them correctly. If a fake token isn't spotted during a privileged operation local elevation of privilege or information disclosure vulnerabilities can be the result. This could allow an attacker to break out of an application sandbox, elevate to administrator privileges, or even compromise the kernel itself. This presentation is about finding and then exploiting the incorrect handling of tokens in the Windows kernel as well as first and third party drivers. Examples of serious vulnerabilities, such as CVE-2015-0002 and CVE-2015-0062 will be presented. It will provide clear exploitable patterns so that you can do your own security reviews for these issues. Finally, I'll discuss some of the ways of exploiting these types of vulnerabilities to elevate local privileges.

Не удается загрузить Youtube-плеер. Проверьте блокировку Youtube в вашей сети.
Повторяем попытку...
Social Engineering The Windows Kernel: Finding And Exploiting Token Handling Vulnerabilities

Поделиться в:

Доступные форматы для скачивания:

Скачать видео

  • Информация по загрузке:

Скачать аудио

Похожие видео

James Forshaw - COM in Sixty Seconds! (well minutes more likely) @ Infiltrate 2017.mp4

James Forshaw - COM in Sixty Seconds! (well minutes more likely) @ Infiltrate 2017.mp4

The Memory Sinkhole - Unleashing An X86 Design Flaw Allowing Universal Privilege Escalation

The Memory Sinkhole - Unleashing An X86 Design Flaw Allowing Universal Privilege Escalation

Арнест ЮниРусь. Прогнозирование с ML: изменения в процессах для усиления технологий

Арнест ЮниРусь. Прогнозирование с ML: изменения в процессах для усиления технологий

Social Engineering the Windows Kernel - James Forshaw, Google

Social Engineering the Windows Kernel - James Forshaw, Google

Take A Hacker To Work Day - How Federal Prosecutors Use The CFAA

Take A Hacker To Work Day - How Federal Prosecutors Use The CFAA

BlueHat IL 2023 — Джеймс Форшоу — Аутентификация Windows

BlueHat IL 2023 — Джеймс Форшоу — Аутентификация Windows

Bochspwn Reloaded: Detecting Kernel Memory Disclosure with x86 Emulation and Taint Tracking

Bochspwn Reloaded: Detecting Kernel Memory Disclosure with x86 Emulation and Taint Tracking

Windows: Под прикрытием — от Hello World до режима ядра от разработчика Windows

Windows: Под прикрытием — от Hello World до режима ядра от разработчика Windows

The Rise of Potatoes: Privilege Escalations in Windows Services

The Rise of Potatoes: Privilege Escalations in Windows Services

SyScan'14 Singapore: All About The Rpc, Lrpc, Alpc, And Lpc In Your Pc By Alex Ionescu

SyScan'14 Singapore: All About The Rpc, Lrpc, Alpc, And Lpc In Your Pc By Alex Ionescu

Guarding Against Physical Attacks: The Xbox One Story — Tony Chen, Microsoft

Guarding Against Physical Attacks: The Xbox One Story — Tony Chen, Microsoft

Detecting Access Token Manipulation

Detecting Access Token Manipulation

VULNERABLE Kernel Drivers for Security Research

VULNERABLE Kernel Drivers for Security Research

Telegram убирают ради «Max»? Есть ли рабочие способы обойти блокировку?

Telegram убирают ради «Max»? Есть ли рабочие способы обойти блокировку?

Windows Offender: Reverse Engineering Windows Defender's Antivirus Emulator

Windows Offender: Reverse Engineering Windows Defender's Antivirus Emulator

BlueHat 2023: Why I Write My Own Security Tooling with James Forshaw

BlueHat 2023: Why I Write My Own Security Tooling with James Forshaw

OffensiveCon22 - James Forshaw -These Are My Principals, If You Don't like Them, I Have Others

OffensiveCon22 - James Forshaw -These Are My Principals, If You Don't like Them, I Have Others

USENIX Enigma 2016 - What Makes Software Exploitation Hard?

USENIX Enigma 2016 - What Makes Software Exploitation Hard?

DEF CON 25 - Morten Schenk - Taking Windows 10 Kernel Exploitation to the next level

DEF CON 25 - Morten Schenk - Taking Windows 10 Kernel Exploitation to the next level

Windows Kernel Vulnerability Research and Exploitation - Gilad Bakas

Windows Kernel Vulnerability Research and Exploitation - Gilad Bakas

© 2025 ycliper. Все права защищены.



  • Контакты
  • О нас
  • Политика конфиденциальности



Контакты для правообладателей: [email protected]