YoVDO

Searching for RPC Functions to Coerce Authentications in Microsoft Protocols

Offered By: Black Hat via YouTube

Tags

Black Hat Courses Cybersecurity Courses Vulnerability Research Courses

Course Description

Overview

Explore an automated approach to discover Remote Procedure Call (RPC) functions that can coerce authentications in Microsoft protocols during this 30-minute Black Hat conference talk. Learn how to parse Microsoft's OpenSpecs online documentation and Interface Definition Language code to gather data for identifying potential authentication-triggering RPC calls. Discover techniques for generating Python proof-of-concept code to remotely trigger these calls, and see how existing vulnerabilities like PrinterBug, PetitPotam, ShadowCoerce, and DFSCoerce can be found quickly using this method. Gain insights into parsing Microsoft Open Specifications, searching for interesting RPC functions, and autogenerating proof-of-concept scripts. Understand Windows coerced authentication methods, defense techniques, and the use of Coercer in scan mode.

Syllabus

Intro
Required information to call a Remote Procedure
Remote Procedures manipulating files
Automated search of RPCs triggering authentications
Parsing Microsoft Open Specifications documentation
Microsoft Open Specifications structure
Parsing Interface Definition Language (IDL)
Searching for interesting RPC functions
Autogenerating proof of concept python scripts
IDL types vs Impacket types
Windows coerced authentications methods
Coercer: mode scan
Defense techniques


Taught by

Black Hat

Related Courses

Ethical Hacking in 15 Hours - 2023 Edition - Learn to Hack
Cyber Mentor via YouTube
Contextomy - Let's Debug Together
nullcon via YouTube
macOS Security Features Bypasses by Example
nullcon via YouTube
Exploiting Android Messengers with WebRTC
nullcon via YouTube
XNU Heap Exploitation - From Kernel Bug to Kernel Control
nullcon via YouTube