Explore a comprehensive analysis of Control Flow Guard (CFG) and learn a new technique to bypass this exploit mitigation measure in Windows systems. Delve into the weaknesses of CFG, implemented by Microsoft in Windows 8.1 Update 3 and Windows 10 technical preview. Discover how to circumvent CFG's protection mechanisms, which typically prevent vital steps in many exploit techniques by validating indirect call targets. Gain insights into a novel approach that not only bypasses CFG comprehensively but also enables previously prevented exploit techniques to become exploitable again. Understand the generic capability underlying this bypass technique and its potential for developing additional exploit methods.
Overview
Syllabus
Bypass Control Flow Guard Comprehensively
Taught by
Black Hat