Главная
Study mode:
on
1
Intro
2
Overview
3
demonstration
4
The Negative Rings...
5
SMM ... pandora's box
6
SMM Security
7
20 years ago...
8
The APIC Remap Attack
9
Attack Strategy
10
Attack Attempt 1: Fails
11
Attack Attempt 2
12
The APIC Payload
13
Attack Attempt 3
14
The Memory Sinkhole
15
The Firmware Ecosystem
16
The template SMM entry
17
A new class of exploits
18
SMM Rootkit
19
Impact
20
Mitigations
21
Looking Forward
22
Conclusion
Description:
Explore a critical x86 design flaw allowing universal privilege escalation in this 47-minute Black Hat conference talk by Christopher Domas. Delve into the complex world of x86 architecture, uncovering a 20-year-old vulnerability that enables malicious code to bypass ring 0 and access ultra-privileged processor modes. Learn about the intricate layers of protection in x86, the forgotten backdoors into privileged realms, and the exploitation of an architectural 0-day built into the silicon. Discover the APIC Remap Attack, the Memory Sinkhole, and their implications for system security. Examine the firmware ecosystem, SMM rootkits, and potential mitigations. Gain insights into this unique and complex vulnerability, its impact on every system, and the future of x86 security.

The Memory Sinkhole - Unleashing An X86 Design Flaw Allowing Universal Privilege Escalation

Black Hat
Add to list