Close Encounters of the Advanced Persistent Kind: Leveraging Rootkits for Post-Exploitation

  Рет қаралды 3,750

Black Hat

Black Hat

7 ай бұрын

...Our presentation will explore a full-chain Windows kernel post-exploitation scenario, where we discovered and weaponized a Windows 0-day vulnerability to load our kernel rootkit. Once loaded, we will demonstrate how Direct Kernel Object Manipulation (DKOM) can be utilized to dynamically alter OS telemetry/sensor visibility, thereby rendering endpoint security solutions ineffective. Additionally, we will showcase a number of advanced attacks, such as employing Network Driver Interface Specification (NDIS) modules to disrupt EDR cloud telemetry or establish covert persistence channels or directly read memory-resident keyboard states in the Kernel for high-performance global keylogging....
By: Ruben Boonen , Valentina Palmiotti
Full Abstract and Presentation Materials: www.blackhat.c...

Пікірлер
When you Accidentally Compromise every CPU on Earth
15:59
Daniel Boctor
Рет қаралды 829 М.
You Shall Not PASS - Analysing a NSO iOS Spyware Sample
40:22
Black Hat
Рет қаралды 3,2 М.
Spongebob ate Michael Jackson 😱 #meme #spongebob #gmod
00:14
Mr. LoLo
Рет қаралды 10 МЛН
Amazing Parenting Hacks! 👶✨ #ParentingTips #LifeHacks
00:18
Snack Chat
Рет қаралды 23 МЛН
The Tragedy of systemd
47:18
linux.conf.au
Рет қаралды 1,1 МЛН
Phishing 2.0 - Detecting Evilginx, EvilnoVNC, Muraena and Modlishka
46:05
How Do Linux Kernel Drivers Work? - Learning Resource
17:02
LiveOverflow
Рет қаралды 551 М.
What's the BEST home server operating system?
17:35
Christian Lempa
Рет қаралды 660 М.
new linux exploit is absolutely insane
8:29
Low Level
Рет қаралды 429 М.
Spongebob ate Michael Jackson 😱 #meme #spongebob #gmod
00:14
Mr. LoLo
Рет қаралды 10 МЛН