Главная
Study mode:
on
1
Intro
2
The story of the vulnerability
3
The bug
4
Constraints
5
Memory Layout
6
Demo
7
Windows 10 1709
8
Ideas
9
First Attempt
10
VideoDirtListener
11
Looping in Direct Caller
12
RPC Server Call2
13
MemCopy Gadget
14
Strategy
15
Raw payload
16
Raw payload demo
17
Second payload
18
VM Worker
19
Lessons Learned
20
Language Safety
21
Bug Elimination
22
Virtualization Sandbox
23
Outro
Description:
Examine a powerful vulnerability in Hyper-V's emulated storage component and learn how it was exploited on Windows Server 2012R2 in this 50-minute Black Hat conference talk. Explore the bug's discovery, constraints, and memory layout before witnessing a live demonstration. Delve into various exploitation techniques, including attempts on Windows 10 1709, RPC server calls, and memory copy gadgets. Analyze the raw payload and its demo, followed by insights into the VM Worker process. Conclude with valuable lessons on language safety, bug elimination, and virtualization sandboxing in this comprehensive exploration of Hyper-V security.

Exploiting the Hyper-V IDE Emulator to Escape the Virtual Machine

Black Hat
Add to list
0:00 / 0:00