Overview
Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore a groundbreaking technique for automatically discovering file privilege escalation bugs in Windows services in this 21-minute Black Hat conference talk. Delve into the methodology developed by a web security researcher with minimal initial knowledge of Windows internals. Learn about the analysis of Advanced Local Procedure Call (ALPC), the identification of new attack surfaces, and the implementation of hot patches to transform process monitoring into a command-line tool for detecting sensitive operations. Gain insights into the inner workings of this innovative system that combines various elements to automate the discovery of file privilege escalation vulnerabilities. Follow the presenter's journey from historical bug analysis to the development of a powerful tool for enhancing Windows security.
Syllabus
Introduction
About the talk
Agenda
Logical Privileges
System Service Operations
Protocol Sequences
LPC Interfaces
LowHanging Fruits
Case Study 1
STL
System Token
Process
How it will exploit
Installer Service
Function List
New Bag
Testing
Repair
Attack Power
Sand Art
Canvas Users Token
Windows Defender Service
Virus Removal
System Service
Jim Salvaggio
Taught by
Black Hat