A Logo

Feel free to include my content in your page via my
RSS feed

Help Irongeek.com pay for
bandwidth and research equipment:

Search Irongeek.com:

Affiliates:
Irongeek Button
Social-engineer-training Button

Help Irongeek.com pay for bandwidth and research equipment:

paypalpixle


State of Win32k Security: Revisiting Insecure design - Vishal Chauhan Derbycon 2018 (Hacking Illustrated Series InfoSec Tutorial Videos)

State of Win32k Security: Revisiting Insecure design
Vishal Chauhan
Derbycon 2018

Win32k.sys is infamous for being the prime target used by hackers for modern exploitation and browser/sandbox escapes on Windows: the driver managing the user and graphics subsystems. With its legacy spanning as far back as NT 4 (released in 1996), there are significant challenges with its security attestation. This talk while touching a bit of Win32k history covering its various design shifts at the expense of security, but will mostly focus on how long standing insecure design were revisited and remediate. In hindsight the talk will give a deeper analysis on various mitigations added in latest Windows release (RS4), resulting in exploits getting more expensive, unreliable and in some cases impossible.

Vishal Chauhan is a Security Engineering Lead in Microsoft Security Response Center (MSRC) team. His background includes deep kernel security expertise and has driven and developed multiple security mitigation approaches in Windows kernel space, including but not limited to Win32k security.

@axsdnied

Back to Derbycon 2018 video list

Printable version of this article

15 most recent posts on Irongeek.com:


If you would like to republish one of the articles from this site on your webpage or print journal please contact IronGeek.

Copyright 2016, IronGeek
Louisville / Kentuckiana Information Security Enthusiast