Using a Patched Vulnerability to Bypass Windows 8 x64 Driver Signature Enforcement. MJ0011 [email protected]
|
|
|
- Shannon Lang
- 10 years ago
- Views:
Transcription
1 Using a Patched Vulnerability to Bypass Windows 8 x64 Driver Signature Enforcement MJ0011 [email protected]
2 Agenda Background A Patched Vulnerability: CVE Bypass DSE on Windows7 x64 Windows8 Kernel Security Improvements Bypass DSE on Windows8 x64
3 Background x64 Driver Signature Enforcement(DSE) A new feature introduced from Vista x64, which requires a special Kernel Mode Code Signing(KMCS) in order to load kernel-mode driver even though administrator privilege. x64 OS kernel will use MiValidateImagePages and ci.dll's callbacks to check whether kernel-mode driver has KMCS. If you try to load any kernel-mode module which is not certified by KMCS, the loading will be refused.
4 Background If an unsigned driver tries to install, it will pop-up window tips.
5 Background Developers must purchase a Class 3 Commercial Software Publisher Certificate from VeriSign. It costs $500 per year, and is only available to commercial entities.
6 Background Known x64 DSE bypass method in the past: Press F8 button during system boot and choose "Disable Driver Signature Enforcement" It's messy to press F8 and choose it every time Ugly watermark will be displayed on the desktop Bypass DSE with modified MBR Modify MBR at risk. It may introduce malicious software Not compatible with Secure Boot in Windows8 Need to restart to be effiective Using kernel 0day vulnerability to bypass DSE (eg. CVE ) No public stable exploit code Microsoft will fix kernel vulnerabilities quickly.
7 Background I want to show a better way to bypass x64 DSE. It demands: Bypass automatically. No need to manually set. More safer. Without modify MBR or other boot stuff. Effective immediately without reboot. Do not use 0day vulnerabilities. Support Windows7 and Windows8 with fully patched.
8 A Patched Vulnerability: CVE Target: A patched kernel vulnerability : CVE Driver Improper Interaction with Windows Kernel Vulnerability All Microsoft Windows NT operating systems are affected from Windows NT4 to Windows 7 and Server 2008 R2. The code to cause this vulnerability has been written in 20 years ago(1992). After I reported this vulnerability to Microsoft in 2010, Microsoft released the security bulletin (MS11-011) in Mar 2011 to fix it.
9 A Patched Vulnerability: CVE Formation conditions of CVE : Use RTL_QUERY_REGISTRY_DIRECT flag. Not initialize EntryContext according to key value type. The root cause of CVE : When using RTL_QUERY_REGISTRY_DIRECT flag, RtlQueryRegistryValues copy data into EntryContext according to key value type. According to key value type, EntryContext need to set in different buffer length. The problem is that key value type in registry can be changed If the given key value type is unexpected and the expected buffer length is too small, it will cause stack overflow.
10 A Patched Vulnerability: CVE Starting with MS11-011, Microsoft has gradually fix this vulnerability: Use HKLM\SYSTEM\CurrentControlSet\Control\RtlQueryRegistryConf ig\trustedtypeskeylis to control read operations of registry which using by known improper interaction drivers New drivers can use RTL_QUERY_REGISTRY_TYPECHECK flag to mandatory RtlQueryRegistryValues to do the type check. If value type does not match, it will return a failure (mainly used in Windows8). Initilaize EntryContext properly, eg. if expected value type is REG_DWORD then initialize it to 0. Add security cookie check in functions which calling RtlQueryRegistryValues(mainly used in Windows8).
11 A Patched Vulnerability : CVE TrustedTypesKeyList on Windows7 x64
12 Bypass DSE on Windows7 x64 The situation of CVE on Windows7 with fully patched The TrustedTypesKeyList config only protect user-specific areas of registry, but sensitive areas of registry is unprotect. The TrustedTypesKeyList config can be deleted by Admin user The Windows7 with fully patched has fixed some known positions which can trigger this vulnerability under admin privileges nt!rtlquerytimezoneinformation win32k!setdpisettings win32k!breadusersystemeudcregistry But, because of cost considerations, there are a lot of drivers with improper interaction problem are unfixed The target driver to bypass Windows7 x64 DSE: AppID.sys
13 Bypass DSE on Windows7 x64 AppID.sys: It is the kernel part of Application Identity service, and it helps AppLocker to block specified program. AppID!AipReadConfigOption, uses RtlQueryRegistryValues to read registy key values from: HKLM\SYSTEM\CurrentControlSet\Control\AppID. It has improper interaction problem. AppID.sys reserves REG_DWORD length of buffer for the key value data. If the data length exceeds, it will cause stack overflow. AipReadConfigOptions can be triggered in the context of caller process by DeviceIoControl, and this function has no security cookie checks. So we can directly overwrite the return address by stack overflow and jump to shell code.
14 Bypass DSE on Windows7 x64 The complete process of bypass Windows7x64 DSE: The AppID device is set to a specific security descriptor, only LocalService account's process can open it. Here I duplicate the token from AppIDSvc service's process, use duplicated token to create new process and open the AppID device. Set Control\AppID\EnablePath key value data with enough length in REG_BINARY format, and overwrite the return address. Send control code 0x22A010 to AppID device. It will trigger AipReadConfigOptions. Jump to shell code, and modify nt!g_cienabled to 0, then disable x64 DSE. Demo source code:
15 Windows8 Kernel Security Improvements Kernel Security Improvements on Windows8: Fixed improper interaction problem for all the Win8 drivers Now there are initialize EntryContext accroding to key value type properly, and add security cookie check for every function which calling RtlQueryRegistryValues. Introducing the new RtlQueryRegistryValuesEx function. Windows8 drivers use this new function as much as possible. If driver calls new function and the registy key is untrusted, it would cause BugCheck = KERNEL_SECURITY_CHECK_FAILURE. Enhanced kernel's security cookie mechanism It makes forcasting kernel security cookie becomes almost impossible. Add SMEP and non-executable non-paged pool supports.
16 Windows8 Kernel Security Improvements In the past, kernel security cookie could be forcasted: J00ru: Windows Kernel-mode GS Cookies subverted The paper introduced a way to using module load time to forcast security cookie, bypass security cookie check and exploit CVE The success rate of more than 46%. Windows8 enhances kernel security cookie mechanism: OS loader tries 5 ways to get high entropy source. It includes external entropy, TPM entropy, clock entropy, ACPI entropy and RDRAND entropy. The RDRAND entropy is generated by Intel Secure Key technology, using new "RDRAND" CPU instruction to generate high quality entropy through hardware. It is difficult to forcast security cookie on Windows8 x64.
17 Windows8 Kernel Security Improvements SMEP: Supervisor-Mode Execution Prevention. The new feature introduced in Intel 3rd generation Core processor - Ivy Bridge: After enabling SMEP, it could allows pages to be protected from supervisor mode instruction fetches. Windows8 enables SMEP by default:(cr4.smep = 1), When kernel code running under Ring0 directly jump to code in ring3, it will cause Bug Check = ATTEMPTED_EXECUTE_OF_NONEXECUTE_MEMORY. The most of kernel vulnerability attacks use some trick to make kernel code jump to preset shell code which is placed in user address space So most of kernel exploits(included the exploit for CVE ) can not use directly on Windows8.
18 Windows8 Kernel Security Improvements Artem Shishkin. Intel SMEP overview and partial bypass on Windows 8 This paper mentioned a way to manipulate data in win32k object, and get the address of win32k object to bypass SMEP. It only can use on Windows8 x86, dose not work on Windows8 x64 Paged session pool used in win32k is non-executable on Windows8 x64 Combined with the newly introduced and widely used 'NonpagedPoolNx' type pool and non-executable paged pool, bypassing SMEP with manipulate kernel data can not work on Windows8 x64
19 Bypass DSE on Windows8 x64 To use CVE to bypass DSE on Windows8 x64, we need to solve these problems: Find driver with improper interaction problem which accords with the following conditions: Do not initialize EntryContext properly The function which calls RtlQueryRegistryValues does not be protected by security cookie. Do not use RTL_QUERY_REGISTRY_TYPECHECK flag. Bypass SMEP
20 Bypass DSE on Windows8 x64 It looks like difficult to find suitable drivers: I manually reviewed all the drivers on Windows8 x64 which calling RtlQueryRegistryValues(Ex) function. But I did not find matching driver. All the drivers on Windows8 did the right interaction. Using CVE to Windows8 x64 DSE is impossible? No! With administrator privileges, we can reuse signed driver in Windows7. My method: to find a driver which has improper interaction problem on Windows7. If this driver has embedded KMCS, it can be load on Windows8 x64! Finally, I find the mathced driver: mountmgr.sys.
21 Bypass DSE on Windows8 x64 mountmgr.sys: Mount point manager driver which handles volume assignments. It has embedded KMCS which can be verified on Windows8. Mountmgr!DriverEntry->MountmgrReadNoAutoMount function has RtlQueryRegistryValues improper interaction problem, and it has no security cookie check. We can unload the new mountmgr.sys with NtLoadDriver API, and reload the old mountmgr.sys with NtLoadDriver. Then triggers stack overflow. It reads registy key value from: HKLM\System\CurrentControlSet\Services\Mountmgr\NoAut omount
22 Bypass DSE on Windows8 x64 Bypass SMEP: use ROP(Return-Oriented Programming) Artem Shishkin & Ilya Smit:Bypassing Intel SMEP on Windows 8 x64 Using Return-oriented Programming(2012/9/19) This paper mentioned a way to set ROP chain and modifying cr4.smep to 0 to bypass SMEP Can not use in the scene of mountmgr: It triggers stack overflow in DriverEntry which in the context of SYSTEM process. Even if we turned off SMEP, it also can not access user mode memory My method: Setting ROP chain with ExAllocatePool + MmCopyVirtualMemory combo to bypass SMEP
23 Bypass DSE on Windows8 x64 Setting ROP chain under x64: most of API use registers to pass parameters. So we need to control registers. The compact design of ROP chain: HvlEndSystemInterrupt : manipulate rdx / rax / rcx KeInitializeEnumerationContext: save rcx to address IofCallDriver: manipulate jump RtlIsServicePackVersionInstalled : manipulate r8 EtwEventEnabled : manipulate r9 KeSetHardwareCounterConfiguration : manipulate r8 PsGetThreadTeb : load rax from address MmMapIoSpace : manipulate rsp All of above are exported functions, without brute force code search.
24 The first problem in setting ROP chain: Bypass DSE on Windows8 x64 The MountmgrReadNoAutoMount will overwrite stack of outside function, and it will overwrite an important variable DeviceObject. Before DriverEntry returning, it would call IoRegisterShutdownNotification to register shutdown callback for this DeviceObject. A wrong variable will cause BSOD. Solution: Use NtQuerySystemInformation to get current thread object address, and use it to overwrite DeviceObject variable. IoRegisterShutdownNotification will do the bit-or operation with DeviceObject->Flags(offset 0x30) and DO_SHUTDOWN_REGISTERED. There corresponds StackLimit field in thread object, and do not affect of thread execution. After bypassing SMEP and taking control, we need unregister the shutdown callback and fix thread object.
25 The second problem in setting ROP chain: Bypass DSE on Windows8 x64 Under x64, ExAllocatePool will destroy rsp+8~rsp+0x20 and use this area as temporary variables. That will destroy the ROP chain. Solution: put a 'add rsp, 0x28' invoke next to the ExAllocatePool 's invoke, and bypass the temporary variables area. We can continue to run ROP chain after bypassed temporary variables area.
26 Bypass DSE on Windows8 x64 The complete process of bypass DSE on Windows8 x64: Prepare imformation of ROP chain, and write stack data into NoAutoMount key value. Call NtUnloadDriver to unload loaded mountmgr driver,and modify service registy key value, then call NtLoadDriver to load old mountmgr driver. Start to trigger the calling of ROP chain, control register to call ExAllocatePool to allocate kernel executable memory. Control register to call MmCopyVirtualMemory and copy user mode shell code memory from attack process into kernel space Load the address from KiBugcheckData and jump to shell code Fix up stack environment and shutdown callback, modify ci!g_cioptions to disable DSE on Windows8 Demo source code:
27 Reference J00ru. Exploiting the otherwise non-exploitable:windows Kernel-mode GS Cookies subverted Artem Shishkin. Intel SMEP overview and partial bypass on Windows 8 Artem Shishkin & Ilya Smit. Bypassing Intel SMEP on Windows 8 x64 Using Return-oriented Programming
28 Q&A Q&A
Sandbox Roulette: Are you ready for the gamble?
Sandbox Roulette: Are you ready for the gamble? Rafal Wojtczuk [email protected] Rahul Kashyap [email protected] What is a sandbox? In computer security terminology, a sandbox is an environment designed
Windows Kernel Internals for Security Researchers
Windows Kernel Internals for Security Researchers Overview This course takes a deep dive into the internals of the Windows kernel from a security perspective. Attendees learn about behind the scenes working
Exploiting nginx chunked overflow bug, the undisclosed attack vector
Exploiting nginx chunked overflow bug, the undisclosed attack vector Long Le [email protected] About VNSECURITY.NET CLGT CTF team 2 VNSECURITY.NET In this talk Nginx brief introduction Nginx chunked
Optimizing Windows Security Features to Block Malware and Hack Tools on USB Storage Devices
350 PIERS Proceedings, Cambridge, USA, July 5 8, 2010 Optimizing Windows Security Features to Block Malware and Hack Tools on USB Storage Devices Dung Vu Pham 1, Malka N. Halgamuge 2, Ali Syed 1, and Priyan
Trustworthy Computing
Stefan Thom Senior Software Development Engineer and Security Architect for IEB, Microsoft Rob Spiger, Senior Security Strategist Trustworthy Computing Agenda Windows 8 TPM Scenarios Hardware Choices with
The Leader in Cloud Security SECURITY ADVISORY
The Leader in Cloud Security SECURITY ADVISORY Security Advisory - December 14, 2010 Zscaler Provides Protection in the Face of Significant Microsoft Year End Patch Cycle Zscaler, working with Microsoft
Virtualization System Security
Virtualization System Security Bryan Williams, IBM X-Force Advanced Research Tom Cross, Manager, IBM X-Force Security Strategy 2009 IBM Corporation Overview Vulnerability disclosure analysis Vulnerability
How To Write A Windows Operating System (Windows) (For Linux) (Windows 2) (Programming) (Operating System) (Permanent) (Powerbook) (Unix) (Amd64) (Win2) (X
(Advanced Topics in) Operating Systems Winter Term 2009 / 2010 Jun.-Prof. Dr.-Ing. André Brinkmann [email protected] Universität Paderborn PC 1 Overview Overview of chapter 3: Case Studies 3.1 Windows Architecture.....3
Computer Security: Principles and Practice
Computer Security: Principles and Practice Chapter 24 Windows and Windows Vista Security First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Windows and Windows Vista Security
Code Injection From the Hypervisor: Removing the need for in-guest agents. Matt Conover & Tzi-cker Chiueh Core Research Group, Symantec Research Labs
Code Injection From the Hypervisor: Removing the need for in-guest agents Matt Conover & Tzi-cker Chiueh Core Research Group, Symantec Research Labs SADE: SteAlthy Deployment and Execution Introduction
UNCLASSIFIED Version 1.0 May 2012
Secure By Default: Platforms Computing platforms contain vulnerabilities that can be exploited for malicious purposes. Often exploitation does not require a high degree of expertise, as tools and advice
Creating a More Secure Device with Windows Embedded Compact 7. Douglas Boling Boling Consulting Inc.
Creating a More Secure Device with Windows Embedded Compact 7 Douglas Boling Boling Consulting Inc. About Douglas Boling Independent consultant specializing in Windows Mobile and Windows Embedded Compact
The Sandbox Roulette: are you ready to gamble? Rafal Wojtczuk [email protected] Rahul Kashyap [email protected]
The Sandbox Roulette: are you ready to gamble? Rafal Wojtczuk [email protected] Rahul Kashyap [email protected] What is a sandbox? Environment designed to run untrusted (or exploitable) code, in a manner
Security Policy for FIPS 140 2 Validation
BitLocker Windows OS Loader Security Policy for FIPS 140 2 Validation BitLocker Windows OS Loader (winload) in Microsoft Windows 8.1 Enterprise Windows Server 2012 R2 Windows Storage Server 2012 R2 Surface
Windows8 Internals, Sixth Edition, Part 1
Microsoft Windows8 Internals, Sixth Edition, Part 1 Mark Russinovich David A. Solomon Alex lonescu Windows Internals, Sixth Edition, Part i Introduction xvii Chapter 1 Concepts and Tools 1 Windows Operating
Eugene Tsyrklevich. Ozone HIPS: Unbreakable Windows
Eugene Tsyrklevich Eugene Tsyrklevich has an extensive security background ranging from designing and implementing Host Intrusion Prevention Systems to training people in research, corporate, and military
CS161: Operating Systems
CS161: Operating Systems Matt Welsh [email protected] Lecture 2: OS Structure and System Calls February 6, 2007 1 Lecture Overview Protection Boundaries and Privilege Levels What makes the kernel different
SysPatrol - Server Security Monitor
SysPatrol Server Security Monitor User Manual Version 2.2 Sep 2013 www.flexense.com www.syspatrol.com 1 Product Overview SysPatrol is a server security monitoring solution allowing one to monitor one or
Sandy. The Malicious Exploit Analysis. http://exploit-analysis.com/ Static Analysis and Dynamic exploit analysis. Garage4Hackers
Sandy The Malicious Exploit Analysis. http://exploit-analysis.com/ Static Analysis and Dynamic exploit analysis About Me! I work as a Researcher for a Global Threat Research firm.! Spoke at the few security
Compromise-as-a-Service
ERNW GmbH Carl-Bosch-Str. 4 D-69115 Heidelberg 3/31/14 Compromise-as-a-Service Our PleAZURE Felix Wilhelm & Matthias Luft {fwilhelm, mluft}@ernw.de ERNW GmbH Carl-Bosch-Str. 4 D-69115 Heidelberg Agenda
Hotpatching and the Rise of Third-Party Patches
Hotpatching and the Rise of Third-Party Patches Alexander Sotirov [email protected] BlackHat USA 2006 Overview In the next one hour, we will cover: Third-party security patches _ recent developments
ReactOS is (not) Windows. Windows internals and why ReactOS couldn t just use a Linux kernel
ReactOS is (not) Windows Windows internals and why ReactOS couldn t just use a Linux kernel ReactOS is (not) Windows ReactOS is Windows Runs Windows applications Runs Windows drivers Looks like Windows
Introduction to Computer Security
Introduction to Computer Security Windows Security Pavel Laskov Wilhelm Schickard Institute for Computer Science Microsoft Windows Family Tree Key security milestones: NT 3.51 (1993): network drivers and
Windows Server Virtualization & The Windows Hypervisor
Windows Server Virtualization & The Windows Hypervisor Brandon Baker Lead Security Engineer Windows Kernel Team Microsoft Corporation Agenda - Windows Server Virtualization (WSV) Why a hypervisor? Quick
Bypassing Memory Protections: The Future of Exploitation
Bypassing Memory Protections: The Future of Exploitation Alexander Sotirov [email protected] About me Exploit development since 1999 Research into reliable exploitation techniques: Heap Feng Shui in JavaScript
Example of Standard API
16 Example of Standard API System Call Implementation Typically, a number associated with each system call System call interface maintains a table indexed according to these numbers The system call interface
A+ Guide to Managing and Maintaining Your PC, 7e. Chapter 2 Introducing Operating Systems
A+ Guide to Managing and Maintaining Your PC, 7e Chapter 2 Introducing Operating Systems Objectives Learn about the various operating systems and the differences between them Learn about the components
Agenda. Context. System Power Management Issues. Power Capping Overview. Power capping participants. Recommendations
Power Capping Linux Agenda Context System Power Management Issues Power Capping Overview Power capping participants Recommendations Introduction of Linux Power Capping Framework 2 Power Hungry World Worldwide,
Windows NT. Chapter 11 Case Study 2: Windows 2000. Windows 2000 (2) Windows 2000 (1) Different versions of Windows 2000
Chapter 11 Case Study 2: Windows 2000 11.1 History of windows 2000 11.2 Programming windows 2000 11.3 System structure 11.4 Processes and threads in windows 2000 11.5 Memory management 11.6 Input/output
Fastboot Techniques for x86 Architectures. Marcus Bortel Field Application Engineer QNX Software Systems
Fastboot Techniques for x86 Architectures Marcus Bortel Field Application Engineer QNX Software Systems Agenda Introduction BIOS and BIOS boot time Fastboot versus BIOS? Fastboot time Customizing the boot
Linux Embedded devices with PicoDebian Martin Noha 28.9.2006
Embedded systems Linux Embedded devices with PicoDebian Martin Noha 28.9.2006 24.03.2005 1 Agenda Why did I look in this stuff? What is an embedded device? Characteristic hardware global requirements for
CIS433/533 - Computer and Network Security Operating System Security
CIS433/533 - Computer and Network Security Operating System Security Professor Kevin Butler Winter 2010 Computer and Information Science OS Security An secure OS should provide (at least) the following
Lecture Overview. INF3510 Information Security Spring 2015. Lecture 4 Computer Security. Meaningless transport defences when endpoints are insecure
Lecture Overview INF3510 Information Security Spring 2015 Fundamental computer security concepts CPU and OS kernel security mechanisms Virtualization Memory Protection Trusted computing and TPM Lecture
Unix Security Technologies. Pete Markowsky <peterm[at] ccs.neu.edu>
Unix Security Technologies Pete Markowsky What is this about? The goal of this CPU/SWS are: Introduce you to classic vulnerabilities Get you to understand security advisories Make
Windows 7. Qing Liu [email protected] Michael Stevens [email protected]
Windows 7 Qing Liu [email protected] Michael Stevens [email protected] 1 Overview 1. Financial Institution s Preliminary Steps 2. User Interface 3. Data Protection 4. User and Group Changes
Bypassing Browser Memory Protections in Windows Vista
Bypassing Browser Memory Protections in Windows Vista Mark Dowd & Alexander Sotirov [email protected] [email protected] Setting back browser security by 10 years Part I: Introduction Thesis Introduction
Patch Management. A newsletter for IT Professionals. Issue 6. I. Background of Patch Management. Education Sector Updates
Patch Management A newsletter for IT Professionals Education Sector Updates Issue 6 I. Background of Patch Management A software patch is an additional piece of program codes or executable designed to
Comprehensive Security for Internet-of-Things Devices With ARM TrustZone
Comprehensive Security for Internet-of-Things Devices With ARM TrustZone Howard Williams mentor.com/embedded Internet-of-Things Trends The world is more connected IoT devices are smarter and more complex
Objectives. Chapter 2: Operating-System Structures. Operating System Services (Cont.) Operating System Services. Operating System Services (Cont.
Objectives To describe the services an operating system provides to users, processes, and other systems To discuss the various ways of structuring an operating system Chapter 2: Operating-System Structures
Detecting the Presence of Virtual Machines Using the Local Data Table
Detecting the Presence of Virtual Machines Using the Local Data Table Abstract Danny Quist {[email protected]} Val Smith {[email protected]} Offensive Computing http://www.offensivecomputing.net/
Attacking Hypervisors via Firmware and Hardware
Attacking Hypervisors via Firmware and Hardware Mikhail Gorobets, Oleksandr Bazhaniuk, Alex Matrosov, Andrew Furtak, Yuriy Bulygin Advanced Threat Research Agenda Hypervisor based isolation Firmware rootkit
Guardian: Hypervisor as Security Foothold for Personal Computers
Guardian: Hypervisor as Security Foothold for Personal Computers Yueqiang Cheng, Xuhua Ding Singapore Management University (SMU) The International Conference on Trust & Trustworthy Computing (TRUST),
Timbuktu Pro for Windows, version 8
Timbuktu Pro for Windows, version 8 Release Notes, version 8.6.8 May 2010 This document contains important information about Timbuktu Pro for Windows, version 8. If you have additional questions, consult
Defense in Depth: Protecting Against Zero-Day Attacks
Defense in Depth: Protecting Against Zero-Day Attacks Chris McNab FIRST 16, Budapest 2004 Agenda Exploits through the ages Discussion of stack and heap overflows Common attack behavior Defense in depth
Best Practice Document Hints and Tips
Marshal Ltd. Date: 02/06/2007 Marshal EndPoint Security From Best Practice Document Hints and Tips Marshal Software Ltd CSL 005 Marshal EndPoint Security Best Practice (2) Privacy Control: None Version:
Advanced Endpoint Protection Overview
Advanced Endpoint Protection Overview Advanced Endpoint Protection is a solution that prevents Advanced Persistent Threats (APTs) and Zero-Day attacks and enables protection of your endpoints by blocking
Verified for Windows Server 2003 Test Specification
Verified for Windows Server 2003 Test Specification VERSION 1.0 April 23, 2003 Microsoft Corporation ii This document is provided for informational purposes only and Microsoft makes no warranties, either
IBM Tivoli Monitoring V6.2.3, how to debug issues with Windows performance objects issues - overview and tools.
IBM Tivoli Monitoring V6.2.3, how to debug issues with Windows performance objects issues - overview and tools. Page 1 of 13 The module developer assumes that you understand basic IBM Tivoli Monitoring
Operating System Structures
COP 4610: Introduction to Operating Systems (Spring 2015) Operating System Structures Zhi Wang Florida State University Content Operating system services User interface System calls System programs Operating
4 Backing Up and Restoring System Software
4 Backing Up and Restoring System Software In this Chapter... Planning a Backup Strategy, 4-3 Preparing for Disaster Recovery, 4-4 Creating Boot Recovery Diskettes, 4-5 Making a Full Backup Tape, 4-8 Restoring
Creating Stronger, Safer, Web Facing Code. JPL IT Security Mary Rivera June 17, 2011
Creating Stronger, Safer, Web Facing Code JPL IT Security Mary Rivera June 17, 2011 Agenda Evolving Threats Operating System Application User Generated Content JPL s Application Security Program Securing
Operating Systems 4 th Class
Operating Systems 4 th Class Lecture 1 Operating Systems Operating systems are essential part of any computer system. Therefore, a course in operating systems is an essential part of any computer science
CS420: Operating Systems OS Services & System Calls
NK YORK COLLEGE OF PENNSYLVANIA HG OK 2 YORK COLLEGE OF PENNSYLVAN OS Services & System Calls James Moscola Department of Physical Sciences York College of Pennsylvania Based on Operating System Concepts,
Chapter 3: Operating-System Structures. Common System Components
Chapter 3: Operating-System Structures System Components Operating System Services System Calls System Programs System Structure Virtual Machines System Design and Implementation System Generation 3.1
Supply Chain (In-) Security
Supply Chain (In-) Security Graeme Neilson & Enno Rey Contact us: [email protected], [email protected] Graeme & Enno Graeme Neilson Security Consultant & Researcher Networking, Reverse engineering,
A Hypervisor IPS based on Hardware assisted Virtualization Technology
A Hypervisor IPS based on Hardware assisted Virtualization Technology 1. Introduction Junichi Murakami ([email protected]) Fourteenforty Research Institute, Inc. Recently malware has become more
Cedric Rajendran VMware, Inc. Security Hardening vsphere 5.5
Cedric Rajendran VMware, Inc. Security Hardening vsphere 5.5 Agenda Security Hardening vsphere 5.5 ESXi Architectural Review ESXi Software Packaging The ESXi Firewall ESXi Local User Security Host Logs
Securing your Virtual Datacenter. Part 1: Preventing, Mitigating Privilege Escalation
Securing your Virtual Datacenter Part 1: Preventing, Mitigating Privilege Escalation Before We Start... Today's discussion is by no means an exhaustive discussion of the security implications of virtualization
MCTS Guide to Microsoft Windows 7. Chapter 7 Windows 7 Security Features
MCTS Guide to Microsoft Windows 7 Chapter 7 Windows 7 Security Features Objectives Describe Windows 7 Security Improvements Use the local security policy to secure Windows 7 Enable auditing to record security
Objectives. Windows 7 Security. Desktop OS Market Share. Windows Background. CS140M Fall 2014. Lake
Objectives Windows 7 Security By Al Fall 2014 CS 140M LBCC Background Windows Security Architecture Windows Vulnerabilities Means of Evaluating Metrics System Hardening Windows Defenses OS Security Capabilities
Chapter 3: Operating-System Structures. System Components Operating System Services System Calls System Programs System Structure Virtual Machines
Chapter 3: Operating-System Structures System Components Operating System Services System Calls System Programs System Structure Virtual Machines Operating System Concepts 3.1 Common System Components
CS 356 Lecture 25 and 26 Operating System Security. Spring 2013
CS 356 Lecture 25 and 26 Operating System Security Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control
Attacking Hypervisors via Firmware and Hardware
Attacking Hypervisors via Firmware and Hardware Alex Matrosov (@matrosov), Mikhail Gorobets, Oleksandr Bazhaniuk (@ABazhaniuk), Andrew Furtak, Yuriy Bulygin (@c7zero) Advanced Threat Research Agenda Hypervisor
Security Technology for Smartphones
Security Technology for Smartphones Yasuhiko Abe Hitoshi Ikeda Masafumi Emura Service functions are implemented on smartphones by storing on them personal information, network-operator information, corporate
6WRUP:DWFK. Policies for Dedicated SQL Servers Group
OKENA 71 Second Ave., 3 rd Floor Waltham, MA 02451 Phone 781 209 3200 Fax 781 209 3199 6WRUP:DWFK Policies for Dedicated SQL Servers Group The sample policies shipped with StormWatch address both application-specific
Hooking Nirvana RECON 2015 ALEX IONESCU @AIONESCU 1/26/2016 COPYRIGHT 2015 ALEX IONESCU. ALL RIGHTS RESERVED. 1
Hooking Nirvana STEALTHY INSTRUMENTATION TECHNIQUES RECON 2015 ALEX IONESCU @AIONESCU 1/26/2016 COPYRIGHT 2015 ALEX IONESCU. ALL RIGHTS RESERVED. 1 WHO AM I? Chief Architect at CrowdStrike, a security
A Survey on Virtual Machine Security
A Survey on Virtual Machine Security Jenni Susan Reuben Helsinki University of Technology [email protected] Abstract Virtualization plays a major role in helping the organizations to reduce the operational
Exploiting Trustzone on Android
1 Introduction Exploiting Trustzone on Android Di Shen(@returnsme) [email protected] This paper tells a real story about exploiting TrustZone step by step. I target an implementation of Trusted Execution
FRONT FLYLEAF PAGE. This page has been intentionally left blank
FRONT FLYLEAF PAGE This page has been intentionally left blank Abstract The research performed under this publication will combine virtualization technology with current kernel debugging techniques to
Attacking Host Intrusion Prevention Systems. Eugene Tsyrklevich [email protected]
Attacking Host Intrusion Prevention Systems Eugene Tsyrklevich [email protected] Agenda Introduction to HIPS Buffer Overflow Protection Operating System Protection Conclusions Demonstration
Embedded Operating Systems in a Point of Sale Environment. White Paper
Embedded Operating Systems in a Point of Sale Environment White Paper December 2008 Contents Embedded Operating Systems in a POS Environment... 3 Overview... 3 POS Operating Systems... 3 Operating Systems
Windows XP SP3 Registry Handling Buffer Overflow
Windows XP SP3 Registry Handling Buffer Overflow by Matthew j00ru Jurczyk and Gynvael Coldwind Hispasec 1. Basic Information Name Windows XP SP3 Registry Handling Buffer Overflow Class Design Error Impact
KVM: A Hypervisor for All Seasons. Avi Kivity [email protected]
KVM: A Hypervisor for All Seasons Avi Kivity [email protected] November 2007 Virtualization Simulation of computer system in software Components Processor: register state, instructions, exceptions Memory
ACS 5.x and later: Integration with Microsoft Active Directory Configuration Example
ACS 5.x and later: Integration with Microsoft Active Directory Configuration Example Document ID: 113571 Contents Introduction Prerequisites Requirements Components Used Conventions Background Information
Adjusting Prevention Policy Options Based on Prevention Events. Version 1.0 July 2006
Adjusting Prevention Policy Options Based on Prevention Events Version 1.0 July 2006 Table of Contents 1. WHO SHOULD READ THIS DOCUMENT... 4 2. WHERE TO GET MORE INFORMATION... 4 3. VERIFYING THE OPERATION
CS 377: Operating Systems. Outline. A review of what you ve learned, and how it applies to a real operating system. Lecture 25 - Linux Case Study
CS 377: Operating Systems Lecture 25 - Linux Case Study Guest Lecturer: Tim Wood Outline Linux History Design Principles System Overview Process Scheduling Memory Management File Systems A review of what
Device Driver Best Practices in Windows Embedded Compact 7. Douglas Boling Boling Consulting Inc.
Device Driver Best Practices in Windows Embedded Compact 7 Douglas Boling Boling Consulting Inc. About Douglas Boling Independent consultant specializing in Windows Mobile and Windows Embedded Compact
Dell Client BIOS: Signed Firmware Update
Dell Client BIOS: Signed Firmware Update An Implementation and Deployment Guide to NIST SP800-147 BIOS Protections for Dell Client BIOS Rick Martinez Dell Client BIOS This white paper is for informational
Technology in Action. Alan Evans Kendall Martin Mary Anne Poatsy. Eleventh Edition. Copyright 2015 Pearson Education, Inc.
Technology in Action Alan Evans Kendall Martin Mary Anne Poatsy Eleventh Edition Technology in Action Chapter 4 System Software: The Operating System, Utility Programs, and File Management. Chapter Topics
Introduction to Operating Systems. Perspective of the Computer. System Software. Indiana University Chen Yu
Introduction to Operating Systems Indiana University Chen Yu Perspective of the Computer System Software A general piece of software with common functionalities that support many applications. Example:
Plain English Guide To Common Criteria Requirements In The. Field Device Protection Profile Version 0.75
Plain English Guide To Common Criteria Requirements In The Field Device Protection Profile Version 0.75 Prepared For: Process Control Security Requirements Forum (PCSRF) Prepared By: Digital Bond, Inc.
Backup & Disaster Recovery Appliance User Guide
Built on the Intel Hybrid Cloud Platform Backup & Disaster Recovery Appliance User Guide Order Number: G68664-001 Rev 1.0 June 22, 2012 Contents Registering the BDR Appliance... 4 Step 1: Register the
TrustKey Tool User Manual
TrustKey Tool User Manual 1 Table of Contents 1 Introduction... 5 2 TrustKey Product...6 2.1 TrustKey Tool... 6 2.2 TrustKey function modules...7 2.3 TrustKey using environment...7 3 TrustKey Tool Installation...
Republic Polytechnic School of Information and Communications Technology C226 Operating System Concepts. Module Curriculum
Republic Polytechnic School of Information and Communications Technology C6 Operating System Concepts Module Curriculum Module Description: This module examines the fundamental components of single computer
Auditing a Web Application. Brad Ruppert. SANS Technology Institute GWAS Presentation 1
Auditing a Web Application Brad Ruppert SANS Technology Institute GWAS Presentation 1 Objectives Define why application vulnerabilities exist Address Auditing Approach Discuss Information Interfaces Walk
Hi and welcome to the Microsoft Virtual Academy and
Hi and welcome to the Microsoft Virtual Academy and 2012 Microsoft Corporation 1 the start of the Windows 8 Security Insights training. My name is Milad Aslaner I m part of the Premier Field Engineering
VMware Certified Professional 5 Data Center Virtualization (VCP5-DCV) Exam
Exam : VCP5-DCV Title : VMware Certified Professional 5 Data Center Virtualization (VCP5-DCV) Exam Version : DEMO 1 / 9 1.Click the Exhibit button. An administrator has deployed a new virtual machine on
USB attacks need physical access right? Not any more...
An NCC Group Publication USB attacks need physical access right? Not any more... Prepared by: Andy Davis Research Director andy.davis at nccgroup dot com Contents 1 Introduction... 3 2 The bug and how
PassTest. Bessere Qualität, bessere Dienstleistungen!
PassTest Bessere Qualität, bessere Dienstleistungen! Q&A Exam : VCP510 Title : VMware Certified Professional on VSphere 5 Version : Demo 1 / 7 1.Which VMware solution uses the security of a vsphere implementation
Review from last time. CS 537 Lecture 3 OS Structure. OS structure. What you should learn from this lecture
Review from last time CS 537 Lecture 3 OS Structure What HW structures are used by the OS? What is a system call? Michael Swift Remzi Arpaci-Dussea, Michael Swift 1 Remzi Arpaci-Dussea, Michael Swift 2
Plug and Play for Windows 2000
Operating System Plug and Play for Windows 2000 White Paper Abstract This paper describes the Microsoft Windows 2000 operating system implementation of Plug and Play. Plug and Play is one of a number of
Operating System Security
Operating System Security Klaus Schütz Windows OS Security Microsoft Redmond Before I start My VP love(d) me A frustrated friend 1 Agenda Evolution of Threats Client vs. Server Security Operating System
Revealing Embedded Fingerprints: Deriving intelligence from USB stack interactions
Revealing Embedded Fingerprints: Deriving intelligence from USB stack interactions Andy Davis, Research Director NCC Group Image from: p1fran.com UK Offices Manchester - Head Office Cheltenham Edinburgh
A+ Guide to Software: Managing, Maintaining, and Troubleshooting, 5e. Chapter 3 Installing Windows
: Managing, Maintaining, and Troubleshooting, 5e Chapter 3 Installing Windows Objectives How to plan a Windows installation How to install Windows Vista How to install Windows XP How to install Windows
FINAL DoIT 04.01.2013- v.8 APPLICATION SECURITY PROCEDURE
Purpose: This procedure identifies what is required to ensure the development of a secure application. Procedure: The five basic areas covered by this document include: Standards for Privacy and Security
Homeland Security Red Teaming
Homeland Security Red Teaming Directs intergovernmental coordination Specifies Red Teaming Viewing systems from the perspective of a potential adversary Target hardening Looking for weakness in existing
CSE 120 Principles of Operating Systems. Modules, Interfaces, Structure
CSE 120 Principles of Operating Systems Fall 2000 Lecture 3: Operating System Modules, Interfaces, and Structure Geoffrey M. Voelker Modules, Interfaces, Structure We roughly defined an OS as the layer
6WRUP:DWFK. Policies for Dedicated IIS Web Servers Group. V2.1 policy module to restrict ALL network access
OKENA 71 Second Ave., 3 rd Floor Waltham, MA 02451 Phone 781 209 3200 Fax 781 209 3199 6WRUP:DWFK Policies for Dedicated IIS Web Servers Group The policies shipped with StormWatch address both application-specific
Custom Penetration Testing
Custom Penetration Testing Compromising a Vulnerability through Discovery and Custom Exploitation Stephen Sims Advanced Penetration Testing - 2009 SANS 1 Objectives Penetration Testing Precompiled Tools
Secure Web Application Coding Team Introductory Meeting December 1, 2005 1:00 2:00PM Bits & Pieces Room, Sansom West Room 306 Agenda
Secure Web Application Coding Team Introductory Meeting December 1, 2005 1:00 2:00PM Bits & Pieces Room, Sansom West Room 306 Agenda 1. Introductions for new members (5 minutes) 2. Name of group 3. Current
