Explore kernel exploit hunting and mitigation techniques in this conference talk from the Hack In The Box Security Conference. Dive into the world of cyberwarfare and multi-level attacks, focusing on Windows kernel vulnerabilities exploited by APT attackers and botnet operators. Examine real-world examples of malware families utilizing kernel exploits, including Dyre, Turla, and Necurs. Learn how to proactively discover effective samples with kernel exploits through dynamic analysis systems. Gain insights into analyzing kernel exploits that bypass HIPS detection and prevention methodologies. Witness a demonstration of a prototype tool for effective kernel exploit mitigation. Benefit from the speakers' extensive experience in malware analysis, reverse engineering, and Windows kernel vulnerability research.
Overview
Syllabus
Introduction
Wayne Low
Agenda
User Account Control
Primitive
Limitations
Criminal Exploits
How To Identify What Web
Case Study
Despite
Despite Workflow
EOP Explore
Integrity Level
Taught by
Hack In The Box Security Conference