Overview
Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore advanced Windows kernel exploitation techniques in this Hack In The Box Security Conference talk. Dive deep into the Windows graphics subsystem, examining vulnerabilities and sandbox escape methods. Learn about analyzing object actions, bypassing syscall filters, and fuzzing DxgkInterface functions. Gain insights into recent kernel exploits, mitigation techniques, and the speaker's experience in successfully exploiting Windows 10 from the Edge sandbox. Discover the intricacies of the Windows graphics subsystem, including font engines, window managers, and graphics device interfaces. Follow along as the presenter details their team's discovery of 15+ kernel vulnerabilities and demonstrates three methods for escaping the Edge sandbox to achieve SYSTEM privileges.
Syllabus
Intro
Opening
Introduction
Team
Presentation
Object types
Widgets
Relationship
Point Of View
Deep Dive
API FN
Banana Attack
Review
Callback Table
Sample Code
Public Object
Microsoft
Sandbox
CVG
User
Cursor
Free For Use
Exploit
Bypass
JIT Server
Vendor Permissions
JIT Client
Jetty
The root cause
Whats wrong
Public Palette
Device Contest
Code Review
Exploit Steps
Project Error
Conference Check
System Process
Gadget
Code Execution
Questions
Would it have helped
Taught by
Hack In The Box Security Conference