Главная
Study mode:
on
1
Reverse Engineering & Bug Hunting on KMDF Drivers
2
Different Driver Models
3
Driver and Device Objects
4
Creating the Device
5
IRP Major Function Codes
6
Basic WDM Driver
7
Talking to the Driver
8
Interrupt Request Packets
9
Stack Locations
10
Buffer Access Methods (1/3)
11
IOCTL Code
12
KMDF Overview
13
A basic KMDF driver (3/3)
14
Using Device Interfaces
15
KMDF and Buffer Access
16
Control Device Objects (1/2)
17
Type of Issues • Unsanitized data
18
Kernel Pointers Leakage • Synaptics Touchpad Win64 Driver
19
Finding KMDF drivers
20
Check your drivers!
21
Conclusions (2/2)
Description:
Explore reverse engineering and bug hunting techniques for Kernel Mode Driver Framework (KMDF) drivers in this 45-minute conference talk from 44CON 2018. Begin with a quick recap of Windows Driver Model (WDM) drivers, their common structures, and entry point identification. Dive into KMDF, examining relevant functions for reverse engineering through case studies. Learn to interact with KMDF device objects using SetupDI API and analyze IO queue dispatch routines. Investigate whether the framework enhances security by examining major vendor implementation problems. Gain practical knowledge to conduct bug hunting sessions on KMDF drivers, covering topics such as driver models, device objects, IRP major function codes, buffer access methods, and IOCTL codes. Discover techniques for finding KMDF drivers and identifying potential security issues like unsanitized data and kernel pointer leakage.

Reverse Engineering and Bug Hunting on KMDF Drivers

44CON Information Security Conference
Add to list