Exploiting Hardcore Pool Corruptions in MS Windows Kernel
Hack In The Box Security Conference via YouTube
Overview
Explore advanced techniques for exploiting kernel pool corruptions in Microsoft Windows operating systems, from NT 4.0 to Windows 8. Delve into the challenges posed by enhanced security measures in Windows kernel pool allocators and learn about a 100% reliable exploitation method that overcomes these obstacles. Discover solutions for scenarios where traditional exploitation techniques fail, such as uncontrolled data overflow, constant (zero byte) corruptions, and continuous overflows leading to page faults and system crashes. Gain insights from security researcher Nikita Tarakanov's expertise in Windows NT Kernel exploitation, reverse engineering, and vulnerability research. Understand the significance of kernel-level vulnerabilities in bypassing security measures like sandboxes, and how Microsoft's ongoing efforts to improve kernel security impact exploit development.
Syllabus
#HITB2013AMS D1T2 Nikita Tarakanov - Exploiting Hardcore Pool Corruptions in MS Windows Kernel
Taught by
Hack In The Box Security Conference