Remote Windows Kernel Exploitation - Step Into the Ring 0
Offered By: Black Hat via YouTube
Course Description
Overview
Explore remote Windows kernel exploitation techniques in this Black Hat USA 2005 conference talk by Barnaby Jack. Dive into Ring 0 operations, covering topics such as the Colonel exploit, user API interactions, firewall considerations, and exception handling. Learn about memory dump analysis, redirect execution, and clean return methods. Examine the Send vulnerability, kernel heap overflow techniques, and the Colonel Loader. Discover how to predict stack behavior, implement userland shells, and utilize Ring 3 mapping. Witness the Bomberfish demo and explore Colonel keylogging capabilities, including keystroke capture and interrupt vector manipulation. Investigate methods for overriding kernel code and the Interrupt Descriptor Table (IDT). Gain insights into modular structure, ICMP echo handlers, and custom keyboard handlers. Delve into Colonel payloads, real mode operations, and techniques for preventing interruptions. Master the intricacies of remote Windows kernel exploitation to enhance your understanding of system vulnerabilities and protection mechanisms.
Syllabus
Introduction
Overview
Colonel
Exploit
User API
Firewall Considerations
Exception Handling
Memory Dump Analysis
Redirect Execution
Clean Return
Send Vulnerability
Kernel Heap Overflow
Overwrite
Colonel Loader
GetProcAddress
Predict Stack
Dispatch Level
Userland Shell
Ring 3 Map
APC
Bomberfish Demo
Colonel Keylogger
Keystroke Capture
Interrupt Vector
Overriding Kernel Code
Overriding IDT
Modular structure
ICMP echo handler
Custom keyboard handler
Colonel payloads
Real mode
The sickest room
The boring part
Preventing interruptions
Copying
payload
the payload
Taught by
Black Hat
Related Courses
Attack on Titan M, Reloaded - Vulnerability Research on a Modern Security ChipBlack Hat via YouTube Attacks From a New Front Door in 4G & 5G Mobile Networks
Black Hat via YouTube AAD Joined Machines - The New Lateral Movement
Black Hat via YouTube Better Privacy Through Offense - How to Build a Privacy Red Team
Black Hat via YouTube Whip the Whisperer - Simulating Side Channel Leakage
Black Hat via YouTube