Jump to content
Nytro

UNREAL MODE:BREAKING PROTECTED PROCESSES

Recommended Posts

Posted

UNREAL MODE:BREAKING PROTECTED PROCESSES

Alex Ionescu

NSC 2014

Alex Ionescu’s Blog

@aionescu

INTRODUCTION

•Windows Vista introduced core changes to the kernel to allow atomic, kernel-driven process creation inside of a “protected environment”

•Used to protect access to the DRM keys and to secure the System process

•Windows 8.1 extends that model in order to protect key non-DRM system processes even from Admin, and to mitigate against pass-the-hash attacks

•Digital signatures and code signing now add an additional boundary of protection beyond load/don’t load

•Similar to the iOS Entitlement Model

•Mechanisms change a few core security paradigms:

•Admin == Kernel is something that Microsoft has sometimes disagreed with, especially in light of PatchGuard, Code Signing and DRM. Now it’s really !=

•Unkillableprocesses and unstoppable services are now something supported and documented for developer (mis)use

Download: http://www.nosuchcon.org/talks/2014/D3_05_Alex_ionescu_Breaking_protected_processes.pdf

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.



×
×
  • Create New...