Overview
Syllabus
Intro
Software-based Control-flow Integrity Enforcement - Microsoft Control Flow Guard (CFG)
Software-based Control-flow Integrity Enforcement - Microsoft Return Flow Guard (RFG)
Intel Control-flow Enforcement Technology - The Principle of Shadow Stack
Intel Control-flow Enforcement Technology - The Principle of IBT.
Intel CET Implementation on Windows 10 - Shadow Stack Setup in
Shadow Stack Switching in Switch ToFiberContext
Control-flow Hijacking and ACE on Windows 10 with CET enabled - Possible Ways to Circumvent CET
with CET enabled - CFG Bypass by Abusing Ldrpwork Mechanism
10 with CET enabled - Vulnerable Code Analysis of Unwind Handler Hijacking
Control-flow Hijacking and ACE on Windows 10 with CET enabled - Vulnerable Code Analysis of Frame Consolidation Unwind Callback Routine Hijacking
Control-flow Hijacking and ACE on Windows 10 with CET enabled - Vulnerable Code Analysis of Thread Context Hijacking in Exception Unwind Process
Control-flow Hijacking and ACE on Windows 10 with CET enabled - Thread Context Hijacking in Exception Unwind Process
Taught by
Black Hat