• XSS.stack #1 – первый литературный журнал от юзеров форума

Bypass LSA protection using the BYODLL technique

Focus17

(L2) cache
Пользователь
Регистрация
10.10.2019
Сообщения
328
Реакции
51
Гарант сделки
2
Депозит
0.11
This is a proof-of-concept that shows how a technique such as Bring Your Own Vulnerable DLL (BYODLL) could be used to bypass LSA Protection, or more generally execute arbitrary code within Protected Processes on Windows.


For more information, please check out my blog post series entitled "Ghost in the PPL".


 
The technique is almost always:
1. Use OS intrnl structs to identify a rarely used codepath that runs inside the target PPL proc or in an equally privileged PPL.
2. Force or entice that codepath to load your (catalog signed) DLL / to open a handle on your behalf.
3. Profit.
 


Напишите ответ...
  • Вставить:
Прикрепить файлы
Верх