{"id":10307,"date":"2022-05-19T09:52:19","date_gmt":"2022-05-19T09:52:19","guid":{"rendered":"https:\/\/conference.hitb.org\/hitbsecconf2024auh\/?post_type=session&#038;p=10307"},"modified":"2023-06-14T23:13:28","modified_gmt":"2023-06-14T23:13:28","slug":"windows-kernel-security-a-deep-dive-into-two-exploits-demonstrated-at-pwn2own","status":"publish","type":"session","link":"https:\/\/conference.hitb.org\/hitbsecconf2024auh\/session\/windows-kernel-security-a-deep-dive-into-two-exploits-demonstrated-at-pwn2own\/","title":{"rendered":"Windows Kernel Security: A Deep Dive into Two Exploits Demonstrated at Pwn2Own"},"content":{"rendered":"<p style=\"text-align: justify;\">Windows kernel exploitation is a fascinating and challenging field of research that draws the attention of security researchers and attackers alike. The Windows kernel and its drivers are a vast and complex code base that offers many opportunities for discovering and exploiting vulnerabilities that can lead to system compromise and security mechanisms bypasses. This talk will explore the current state and evolution of Windows kernel security by analyzing and revealing two new exploits that were demonstrated at Pwn2Own this year, showing how kernel code execution was achieved on the latest versions of Windows.<\/p>\n<p style=\"text-align: justify;\">First, <strong>the talk will focus on the Cloud Filter (cldflt.sys) component of Windows<\/strong>, which is responsible for syncing files with cloud storage providers. <strong>The methodology for analyzing,\u00a0 testing this complex driver, and finding a use-after-free vulnerability by fuzzing the exposed Filter Communication Port interface <\/strong>will be presented. The talk will then describe how the vulnerability was exploited by hijacking kernel code execution using gadget functions to defeat Control Flow Guard and escalate the privileges to SYSTEM.<\/p>\n<p style=\"text-align: justify;\"><strong>The second part of this talk will review the current kernel mitigations, their weaknesses, and the future of kernel security<\/strong>. The presentation will discuss how kernel mitigations are evolving such as kernel space layout randomization (<em>KASLR<\/em>), supervisor mode access|execution prevention (<em>SMAP<\/em> &amp; <em>SMEP<\/em>), control-flow enforcement technologies (<em>CET<\/em> &amp; <em>CFG<\/em>), and eliminating common exploit vectors to demonstrate how the first exploit will break in the future.<\/p>\n<p style=\"text-align: justify;\"><strong>The final part will present the second exploit, a logical bug that defeats most mitigations by allowing direct read and write access to kernel virtual memory<\/strong>. The vulnerability and exploit will be explained and demonstrated on stage.<\/p>\n","protected":false},"template":"","class_list":["post-10307","session","type-session","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.3 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Windows Kernel Security: A Deep Dive into Two Exploits Demonstrated at Pwn2Own - HITBSecConf2024 - Abu Dhabi<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/conference.hitb.org\/hitbsecconf2024auh\/session\/windows-kernel-security-a-deep-dive-into-two-exploits-demonstrated-at-pwn2own\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Windows Kernel Security: A Deep Dive into Two Exploits Demonstrated at Pwn2Own - HITBSecConf2024 - Abu Dhabi\" \/>\n<meta property=\"og:description\" content=\"Windows kernel exploitation is a fascinating and challenging field of research that draws the attention of security researchers and attackers alike. The Windows kernel and its drivers are a vast and complex code base that offers many opportunities for discovering and exploiting vulnerabilities that can lead to system compromise and security mechanisms bypasses. This talk [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/conference.hitb.org\/hitbsecconf2024auh\/session\/windows-kernel-security-a-deep-dive-into-two-exploits-demonstrated-at-pwn2own\/\" \/>\n<meta property=\"og:site_name\" content=\"HITBSecConf2024 - Abu Dhabi\" \/>\n<meta property=\"article:modified_time\" content=\"2023-06-14T23:13:28+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/conference.hitb.org\/hitbsecconf2024auh\/wp-content\/uploads\/sites\/23\/2023\/06\/thomas-imbert.png\" \/>\n\t<meta property=\"og:image:width\" content=\"300\" \/>\n\t<meta property=\"og:image:height\" content=\"300\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/conference.hitb.org\/hitbsecconf2024auh\/session\/windows-kernel-security-a-deep-dive-into-two-exploits-demonstrated-at-pwn2own\/\",\"url\":\"https:\/\/conference.hitb.org\/hitbsecconf2024auh\/session\/windows-kernel-security-a-deep-dive-into-two-exploits-demonstrated-at-pwn2own\/\",\"name\":\"Windows Kernel Security: A Deep Dive into Two Exploits Demonstrated at Pwn2Own - HITBSecConf2024 - Abu Dhabi\",\"isPartOf\":{\"@id\":\"https:\/\/conference.hitb.org\/hitbsecconf2024auh\/#website\"},\"datePublished\":\"2022-05-19T09:52:19+00:00\",\"dateModified\":\"2023-06-14T23:13:28+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/conference.hitb.org\/hitbsecconf2024auh\/session\/windows-kernel-security-a-deep-dive-into-two-exploits-demonstrated-at-pwn2own\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/conference.hitb.org\/hitbsecconf2024auh\/session\/windows-kernel-security-a-deep-dive-into-two-exploits-demonstrated-at-pwn2own\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/conference.hitb.org\/hitbsecconf2024auh\/session\/windows-kernel-security-a-deep-dive-into-two-exploits-demonstrated-at-pwn2own\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/conference.hitb.org\/hitbsecconf2024auh\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Session\",\"item\":\"https:\/\/conference.hitb.org\/hitbsecconf2024auh\/session\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Windows Kernel Security: A Deep Dive into Two Exploits Demonstrated at Pwn2Own\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/conference.hitb.org\/hitbsecconf2024auh\/#website\",\"url\":\"https:\/\/conference.hitb.org\/hitbsecconf2024auh\/\",\"name\":\"HITBSecConf2024 - Abu Dhabi\",\"description\":\"Nov 25 - 28, Abu Dhabi, UAE\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/conference.hitb.org\/hitbsecconf2024auh\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Windows Kernel Security: A Deep Dive into Two Exploits Demonstrated at Pwn2Own - HITBSecConf2024 - Abu Dhabi","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/conference.hitb.org\/hitbsecconf2024auh\/session\/windows-kernel-security-a-deep-dive-into-two-exploits-demonstrated-at-pwn2own\/","og_locale":"en_US","og_type":"article","og_title":"Windows Kernel Security: A Deep Dive into Two Exploits Demonstrated at Pwn2Own - HITBSecConf2024 - Abu Dhabi","og_description":"Windows kernel exploitation is a fascinating and challenging field of research that draws the attention of security researchers and attackers alike. The Windows kernel and its drivers are a vast and complex code base that offers many opportunities for discovering and exploiting vulnerabilities that can lead to system compromise and security mechanisms bypasses. This talk [&hellip;]","og_url":"https:\/\/conference.hitb.org\/hitbsecconf2024auh\/session\/windows-kernel-security-a-deep-dive-into-two-exploits-demonstrated-at-pwn2own\/","og_site_name":"HITBSecConf2024 - Abu Dhabi","article_modified_time":"2023-06-14T23:13:28+00:00","og_image":[{"width":300,"height":300,"url":"https:\/\/conference.hitb.org\/hitbsecconf2024auh\/wp-content\/uploads\/sites\/23\/2023\/06\/thomas-imbert.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/conference.hitb.org\/hitbsecconf2024auh\/session\/windows-kernel-security-a-deep-dive-into-two-exploits-demonstrated-at-pwn2own\/","url":"https:\/\/conference.hitb.org\/hitbsecconf2024auh\/session\/windows-kernel-security-a-deep-dive-into-two-exploits-demonstrated-at-pwn2own\/","name":"Windows Kernel Security: A Deep Dive into Two Exploits Demonstrated at Pwn2Own - HITBSecConf2024 - Abu Dhabi","isPartOf":{"@id":"https:\/\/conference.hitb.org\/hitbsecconf2024auh\/#website"},"datePublished":"2022-05-19T09:52:19+00:00","dateModified":"2023-06-14T23:13:28+00:00","breadcrumb":{"@id":"https:\/\/conference.hitb.org\/hitbsecconf2024auh\/session\/windows-kernel-security-a-deep-dive-into-two-exploits-demonstrated-at-pwn2own\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/conference.hitb.org\/hitbsecconf2024auh\/session\/windows-kernel-security-a-deep-dive-into-two-exploits-demonstrated-at-pwn2own\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/conference.hitb.org\/hitbsecconf2024auh\/session\/windows-kernel-security-a-deep-dive-into-two-exploits-demonstrated-at-pwn2own\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/conference.hitb.org\/hitbsecconf2024auh\/"},{"@type":"ListItem","position":2,"name":"Session","item":"https:\/\/conference.hitb.org\/hitbsecconf2024auh\/session\/"},{"@type":"ListItem","position":3,"name":"Windows Kernel Security: A Deep Dive into Two Exploits Demonstrated at Pwn2Own"}]},{"@type":"WebSite","@id":"https:\/\/conference.hitb.org\/hitbsecconf2024auh\/#website","url":"https:\/\/conference.hitb.org\/hitbsecconf2024auh\/","name":"HITBSecConf2024 - Abu Dhabi","description":"Nov 25 - 28, Abu Dhabi, UAE","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/conference.hitb.org\/hitbsecconf2024auh\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/conference.hitb.org\/hitbsecconf2024auh\/wp-json\/wp\/v2\/session\/10307"}],"collection":[{"href":"https:\/\/conference.hitb.org\/hitbsecconf2024auh\/wp-json\/wp\/v2\/session"}],"about":[{"href":"https:\/\/conference.hitb.org\/hitbsecconf2024auh\/wp-json\/wp\/v2\/types\/session"}],"version-history":[{"count":2,"href":"https:\/\/conference.hitb.org\/hitbsecconf2024auh\/wp-json\/wp\/v2\/session\/10307\/revisions"}],"predecessor-version":[{"id":12480,"href":"https:\/\/conference.hitb.org\/hitbsecconf2024auh\/wp-json\/wp\/v2\/session\/10307\/revisions\/12480"}],"wp:attachment":[{"href":"https:\/\/conference.hitb.org\/hitbsecconf2024auh\/wp-json\/wp\/v2\/media?parent=10307"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}