YoVDO

Finding a Weak Link - Attacking Windows OEM Kernel Drivers

Offered By: YouTube

Tags

Conference Talks Courses Cybersecurity Courses Fuzzing Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the intricacies of attacking Windows OEM kernel drivers in this comprehensive conference talk from Derbycon 2016. Delve into driver quarry techniques, fuzzing methodologies, and crash analysis using Driver Verifier. Learn to identify exploitable vulnerabilities, analyze IO Request Packets, and leverage WDF tools for driver examination. Discover real-world examples involving Lenovo drivers and Apple-related exploits. Gain insights into memory manipulation, local denial of service attacks, and secret extraction techniques. Examine locker systems, cloud-based options, and decryption strategies. Conclude with a summary of essential tools and a list of vulnerable drivers uncovered during the presentation.

Syllabus

Introduction
Driver Quarry
WhenTosh
Drivers
Fuzz
Fuzz Improvements
Fuzz Crashes
Driver Verifier
Being Exploitable
Annalise
IO Request Packet
Design Ideas
Identify Windows Drivers
Identify WDF Functions
WDF Tools
Device Type
API Calls
Lenovo Driver
Tale to Box
Space Division
Memory Gaining
Local Denial Service
Memory Read
MyAppleAmbler
Immortal Function
How Function Call
For Loop
Read Secrets
Locker Overview
Memory
heuristics
cloud options
example
decryption
what would really be like
TLDR
Wrapup
Tools
Drivers you found
Did they make it


Related Courses

Security Principles
(ISC)² via Coursera
A Strategic Approach to Cybersecurity
University of Maryland, College Park via Coursera
FinTech for Finance and Business Leaders
ACCA via edX
Access Control Concepts
(ISC)² via Coursera
Access Controls
(ISC)² via Coursera