Пожалуйста, обратите внимание, что пользователь заблокирован
Description
slides
https://github.com/star-sg/OBO/blob...ing win32k Exploitation To The Next Level.pdf
https://offbyone.sgAs a well-known attack surface in Windows system, the Win32k has caused many security problems in history. But with the efforts of Microsoft and security researchers, peoples believe that Win32k has become secure enough that it’s no longer harmful.
Especially with the continuous updates of the mitigation measures added by Microsoft, vulnerabilities in Win32k have become difficult to exploit, It has caused attackers to lose interest in the Win32k.
In this topic, we will present the results of our work, which will completely bypass all security mitigation mechanisms and revitalize the ancient attack surface of the Win32k, so we named it “Next Level”.
More specifically, We will present 5 Win32k vulnerabilities we discovered, which can lead to privilege escalation not only in normal environments. And it can also be used in the sandbox environment, causing the escape of the security sandbox.
Also, we will introduce the various restrictions Microsoft has imposed on Win32k and how to bypass them.
Finally, we will also summarize whether there is universality in vulnerability exploitation and vulnerability mining methods, and what suggestions we have for future win32k security.
slides
https://github.com/star-sg/OBO/blob...ing win32k Exploitation To The Next Level.pdf
Последнее редактирование: