Главная
Study mode:
on
1
Intro
2
About Alex lonescu
3
What is WNF?
4
Why does WNF exist?
5
State Name Lifetime
6
State Scopes
7
Sequence Numbers
8
Registering a WNF State Name
9
Publishing WNF State Data
10
Consuming WNF Data
11
WNF Notifications
12
High Level API
13
Notification Callback
14
Kernel API
15
WNF Name Instance
16
WNF Scope Instance
17
WNF Scope Map
18
WNF Subscription
19
WNF Process Context
20
WinDBG Custom Extension
21
The O-byte Write
22
The Privileged Disclosure
23
The Modern App Launcher Blocker
24
The Crashing Service
25
Discovering State Names and Permissions
26
Discovering Volatile Names
27
Brute Forcing Security Descriptors
28
Creating custom WNF State Names
29
EDR/AM Visibility Options
30
Controlling the System with WNF
31
Interesting Insider Settings
32
Injecting Code with WNF
33
Modifying Callbacks/Contexts for Code Redirection
34
Key Takeaways
Description:
Explore the Windows Notification Facility (WNF), a largely undocumented kernel attack surface, in this Black Hat conference talk. Delve into the intricacies of WNF, its purpose, and its role in cross-process data sharing and communication. Learn about state name lifetimes, scopes, sequence numbers, and the processes of registering, publishing, and consuming WNF state data. Examine the high-level API, notification callbacks, and kernel API components. Discover potential security vulnerabilities, including the O-byte write, privileged disclosure, and modern app launcher blocker. Gain insights into discovering state names, permissions, and creating custom WNF state names. Investigate EDR/AM visibility options and explore methods for controlling the system and injecting code using WNF. Presented by Alex Ionescu and Gabrielle Viala, this talk offers key takeaways for Windows researchers and security professionals looking to understand this complex and potentially exploitable kernel mechanism. Read more

Windows Notification Facility - Peeling the Onion of the Most Undocumented Kernel Attack Surface Yet

Black Hat
Add to list
0:00 / 0:00