YoVDO

The Last Generic Win32K KASLR Defeat in Windows

Offered By: Recon Conference via YouTube

Tags

REcon Conference Courses Exploit Development Courses Windows Security Courses

Course Description

Overview

Explore the intricacies of Windows kernel security in this 55-minute conference talk from Recon 2019. Delve into the last generic Win32K KASLR (Kernel Address Space Layout Randomization) defeat in Windows, presented by Alex Ionescu. Gain insights into the two heaps and leaks in user32!gSharedInfo and PEB, as well as GdiSharedHandleTable and TEB. Examine the Win32Clientinfo and changes implemented in RS4. Investigate the Segment Heap and the bug that keeps the heap header mapped. Discover novel use cases, including breaking the CRC segment heap cookie and retrieving additional pointers. Consider the potential for Local Privilege Escalation (LPE) through ARW. Conclude with an assessment of the current state of KASLR in Windows, enhancing your understanding of kernel security mechanisms and vulnerabilities.

Syllabus

Recon 2019 - The Last Generic Win32K KASLR Defeat in Windows by Alex Ionescu


Taught by

Recon Conference

Related Courses

Harnessing Intel Processor Trace on Windows for Fuzz
Recon Conference via YouTube
Reverse Engineering Satellite Based IP Content Distribution
Recon Conference via YouTube
Reverse Engineering Windows Defender's JavaScript Engine
Recon Conference via YouTube
DIY ARM Debugger for Wi-Fi Chips
Recon Conference via YouTube
Subverting Your Server Through Its BMC - The HPE iLO4 Case
Recon Conference via YouTube