Главная
Study mode:
on
1
Introduction
2
About the talk
3
Agenda
4
Logical Privileges
5
System Service Operations
6
Protocol Sequences
7
LPC Interfaces
8
LowHanging Fruits
9
Case Study 1
10
STL
11
System Token
12
Process
13
How it will exploit
14
Installer Service
15
Function List
16
New Bag
17
Testing
18
Repair
19
Attack Power
20
Sand Art
21
Canvas Users Token
22
Windows Defender Service
23
Virus Removal
24
System Service
25
Jim Salvaggio
Description:
Explore a groundbreaking technique for automatically discovering file privilege escalation bugs in Windows services in this 21-minute Black Hat conference talk. Delve into the methodology developed by a web security researcher with minimal initial knowledge of Windows internals. Learn about the analysis of Advanced Local Procedure Call (ALPC), the identification of new attack surfaces, and the implementation of hot patches to transform process monitoring into a command-line tool for detecting sensitive operations. Gain insights into the inner workings of this innovative system that combines various elements to automate the discovery of file privilege escalation vulnerabilities. Follow the presenter's journey from historical bug analysis to the development of a powerful tool for enhancing Windows security.

Battle of Windows Service - A Silver Bullet to Discover File Privilege Escalation Bugs Automatically

Black Hat
Add to list