Explore the vulnerabilities of Windows-based endpoint security solutions in this eye-opening conference talk. Delve into the world of kernel-mode malicious code and its ability to bypass multiple layers of security software. Learn how a public exploit for the EPATHOBJ Windows kernel vulnerability can be tweaked to circumvent application sandboxes, antivirus programs, HIPS, rootkit detectors, EMET, and SMEP. Witness a demonstration of bypassing every security software typically found on corporate user machines, highlighting the limitations of "defense in depth" strategies. Discuss the need for defensive methods immune to kernel-mode exploits and their potential implementations. Gain insights into the real-world implications of these vulnerabilities, including their use by modern malware like TDL4. Understand the ongoing challenges posed by frequent Windows kernel vulnerabilities and the importance of developing effective defense strategies against them.
Overview
Syllabus
Rafal Wojtczuk: LoL (Layers on Layers) - Bypassing Security for Fun and Profit V2
Taught by
Security BSides London