Breaking Boundaries: Investigating Vulnerable Drivers and Mitigating Risks
Ekoparty Security Conference via YouTube
Overview
Explore a comprehensive security conference talk that delves into the growing concern of vulnerable drivers and their security implications. Learn about Check Point Research's extensive analysis of the root causes behind driver vulnerabilities, discovering common patterns and characteristics shared among compromised drivers. Understand how these vulnerabilities, often surprisingly simple in nature, continue to proliferate within the LOLDrivers project. Examine the methodology used to identify thousands of potentially vulnerable drivers through mass hunting techniques. Gain insights into how security product drivers attempt to implement protective measures, and witness a practical demonstration of exploiting chained vulnerabilities to bypass security controls and elevate kernel privileges. Through real-world examples of compromising well-known security products, grasp the critical concept that fundamental design flaws in drivers will inevitably be exploited, regardless of security mechanisms in place.
Syllabus
Breaking Boundaries: Investigating Vulnerable Drivers and Mitigating Risks - Jiri Vinopal - EKO 2024
Taught by
Ekoparty Security Conference