Главная
Study mode:
on
1
Intro
2
Architectural Overview
3
Interface Definition Language (IDL.)
4
MIDL Compiler
5
Auto-generated Server Definition Information
6
Example NDR Format String
7
Structure Marshalling
8
Client Implementation (32 bit)
9
Managed Implementation
10
Finding RPC Server Interfaces
11
iterative Approach
12
Undocumented Byte Codes
13
Going to the Standards
14
Arrays of Structures with Pointers
15
A Simple Alex Ionescu Trick
16
Finding the ALPC Port
17
Mapping Types
18
Simple Example
19
Dealing with Out Parameters in PowerShell
20
Find New Windows RPC Apis
21
Fuzzing
22
Possible Future Work
Description:
Explore the intricacies of reimplementing local RPC in .NET through this comprehensive conference talk from HITB CyberWeek. Delve into the challenges of finding privilege escalation in local Windows RPC servers and learn about the innovative approaches to implement RPC clients in .NET languages like C# and PowerShell. Discover the process of reverse engineering APIs, implementing NDR parsing and serialization, and integrating with PowerShell. Gain insights into assessing implementation approaches, identifying low-level ALPC implementation, and uncovering new bugs using custom tooling. Benefit from the speaker's expertise in computer hardware and software security, including their recognition as a top MSRC researcher and Pwn2Own winner. Follow along as the presentation covers topics such as Interface Definition Language, MIDL Compiler, NDR Format Strings, structure marshalling, client implementation, and finding RPC server interfaces. Explore undocumented byte codes, standards, and techniques for dealing with arrays of structures with pointers. Learn about fuzzing, possible future work, and gain access to the tooling developed for this research. Read more

Reimplementing Local RPC in .Net

Hack In The Box Security Conference
Add to list