Главная
Study mode:
on
1
Intro
2
What I'm Going to Talk About
3
Local System Vulnerabilities are Dead!
4
System Services and Drivers
5
Service Privilege Levels
6
Service Start Mode
7
Accessible Device Objects
8
Isolated User Mode
9
Isolated LSASS
10
Edge Browser
11
Microsoft Edge Security
12
Microsoft Edge and Flash
13
User Account Control
14
UAC Auto Elevation Directory Check
15
Folder Permissions
16
Elevated Token Impersonation
17
If You Change Task Manager Needs a Prompt
18
Windows Symbolic Links
19
Mitigated in Sandboxes
20
Win32k Hardening
21
User Mode Font Driver
22
Process Silos
23
Opening Device Object
24
Replace the Root Object Directory
25
Public Service Announcement
26
Conclusions
27
Good Old Issue 222
Description:
Explore the security landscape of Windows 10 in this 50-minute conference talk presented by James Forshaw at the 44CON Information Security Conference. Delve into the advanced security features of Windows 10, such as Control Flow Guard and Credentials Isolation, while examining the potential vulnerabilities that accompany these new additions. Gain insights into the challenges of secure engineering as Forshaw dissects local system vulnerabilities, service privilege levels, and isolated user mode. Analyze the security measures implemented in Microsoft Edge, including its handling of Flash content. Investigate User Account Control (UAC) mechanisms, focusing on auto-elevation processes and directory checks. Learn about Windows symbolic links, Win32k hardening, and process silos. Discover how changes in device object handling and root object directory replacement impact system security. Conclude with a public service announcement and reflections on the ongoing complexities of maintaining a secure operating system. Read more

Windows 10 - 2 Steps Forward, 1 Step Back

44CON Information Security Conference
Add to list