Главная
Study mode:
on
1
Introduction
2
First Vulnerability
3
SecureKernel Pool
4
Pull Allocations
5
Push Shipping
6
Undo MDR
7
Ascii MDR
8
LeftArm Context
9
PowerMdl
10
RedWhatWhere
11
Summary
12
Demo
13
Demonstration
14
skmdl
15
safe
16
structures
17
mdl
18
free idea
19
pt allocator
20
target structure
21
in action
22
crash
23
conclusion
24
Questions
Description:
Explore a comprehensive analysis of vulnerabilities in Windows 10's SecureKernel, a critical component of Microsoft's Virtualization Based Security (VBS) model. Delve into the discovery and exploitation of two vulnerabilities that could compromise the entire VBS system by allowing arbitrary code execution in VTL1. Follow the presenters' step-by-step process of exploiting these vulnerabilities on the latest Windows version, gaining insights into the intricacies of virtualization stack security. Learn about SecureKernel Pool, Pull Allocations, Push Shipping, and various MDR concepts. Witness live demonstrations of exploitation techniques, including kmdl safe structures, mdl free idea, and pt allocator target structure. Gain valuable knowledge about the potential weaknesses in virtualization-based security technologies and the importance of continuous improvement in software stack security.

Breaking VSM by Attacking SecureKernel

Black Hat
Add to list
0:00 / 0:00