Главная
Study mode:
on
1
Intro
2
Who are we
3
Motivation
4
Limitations
5
Summary
6
Memory Corruption
7
Stop Attacks
8
Conclusion
9
Control Flow Integrity
10
Need for Relaxed Control Flow
11
Should you use it
12
What it does
13
Impact on performance
14
Sample program
15
Guard check
16
Program crash
17
What does CFG allow
18
How to do security research
19
Whats the key
20
How do we bypass
21
Does it take time
22
Windows Ops
23
Coarse Grain
24
Virtual Protect
25
Flash
26
Black Hat
27
Generic Bypass
28
Stack Do Sink
29
How Did We Get The Tip
30
The Problem
31
Desynchronization
32
Stack Dsync
33
Research
34
Stack Sinking
35
Jackpot Pattern
36
More censored slides
37
Whats interesting
38
In summary
39
Recommendations
40
Questions
Description:
Explore advanced techniques for bypassing Control Flow Guard in Windows 10 through this conference talk from Louisville Infosec 2015. Delve into memory corruption, attack prevention strategies, and the intricacies of Control Flow Integrity. Learn about the need for relaxed control flow, performance impacts, and sample programs demonstrating guard checks. Discover security research methodologies, bypass techniques, and the role of Windows operations in coarse-grain protection. Examine virtual protect mechanisms, Flash vulnerabilities, and generic bypass methods. Investigate stack desynchronization, the "Jackpot Pattern," and censored slides revealing critical insights. Gain valuable recommendations for enhancing system security and participate in a Q&A session to deepen your understanding of these complex cybersecurity concepts.

Bypassing Control Flow Guard in Windows 10

Add to list