Главная
Study mode:
on
1
Introduction
2
Why this talk
3
First generation kernel threats
4
Microsofts defenses
5
Boot Kits
6
Secure Boot
7
Dooku Threats
8
Double Pulsar
9
Hypervisor Code Integrity
10
Red vs Blue
11
Implant Design
12
Turla Driver Loader
13
Improving our tradecraft
14
Datadriven attacks
15
Code reuse attacks
16
Kernel stack hooking
17
Calling a function
18
Readwrite primitive
19
Demo
20
Blacklist of known exploitable drivers
21
How to hunt in the kernel
22
Page table remapping
23
Detecting double pulsar
24
Realtime detection
25
Weaknesses
26
Windows
27
Microsoft
28
Weaknesses Limitations
29
Recap
30
Windows Platform Security
Description:
Explore kernel mode threats and practical defense strategies in this Black Hat conference talk. Delve into the evolution of OS security measures by Microsoft, including PatchGuard, Driver Signature Enforcement, and SecureBoot, and their impact on commodity kernel mode malware. Examine how advanced attackers bypass these protections and continue to leverage kernel mode malware. Learn about first-generation kernel threats, boot kits, and Secure Boot. Investigate Dooku Threats, Double Pulsar, and Hypervisor Code Integrity. Analyze implant design, including the Turla Driver Loader, and explore data-driven attacks, code reuse attacks, and kernel stack hooking. Discover techniques for hunting in the kernel, detecting threats like Double Pulsar, and implementing real-time detection. Evaluate the weaknesses and limitations of Windows platform security, and gain insights into improving your defensive tradecraft against kernel mode threats.

Kernel Mode Threats and Practical Defenses

Black Hat
Add to list