Главная
Study mode:
on
1
Intro
2
Opening
3
Introduction
4
Team
5
Presentation
6
Object types
7
Widgets
8
Relationship
9
Point Of View
10
Deep Dive
11
API FN
12
Banana Attack
13
Review
14
Callback Table
15
Sample Code
16
Public Object
17
Microsoft
18
Sandbox
19
CVG
20
User
21
Cursor
22
Free For Use
23
Exploit
24
Bypass
25
JIT Server
26
Vendor Permissions
27
JIT Client
28
Jetty
29
The root cause
30
Whats wrong
31
Public Palette
32
Device Contest
33
Code Review
34
Exploit Steps
35
Project Error
36
Conference Check
37
System Process
38
Gadget
39
Code Execution
40
Questions
41
Would it have helped
Description:
Explore advanced Windows kernel exploitation techniques in this Hack In The Box Security Conference talk. Dive deep into the Windows graphics subsystem, examining vulnerabilities and sandbox escape methods. Learn about analyzing object actions, bypassing syscall filters, and fuzzing DxgkInterface functions. Gain insights into recent kernel exploits, mitigation techniques, and the speaker's experience in successfully exploiting Windows 10 from the Edge sandbox. Discover the intricacies of the Windows graphics subsystem, including font engines, window managers, and graphics device interfaces. Follow along as the presenter details their team's discovery of 15+ kernel vulnerabilities and demonstrates three methods for escaping the Edge sandbox to achieve SYSTEM privileges.

Over the Edge - Pwning the Windows Kernel

Hack In The Box Security Conference
Add to list