• Goa'16
  • Training
  • Windows Kernel Exploitation

Windows Kernel Exploitation

Ashfaq Ansari

Seats Sold Out

Trainer Name: Ashfaq Ansari
Title: Windows Kernel Exploitation
Duration: 2 Days

Objective

This training is focused on exploitation of different Windows Kernel Mode vulnerabilities ranging from Pool Overflow to Use after Free. We will cover basics of Windows Kernel Internals and hands-on fuzzing of Windows Kernel Mode drivers. We will dive deep into exploit development of various kernel mode vulnerabilities. We will also look into different vulnerabilities in terms of code and the mitigations applied to fix the respective vulnerabilities.
Upon completion of this training, participants will be able to:

  • Learn basics of Windows Internals
  • Understand how to fuzz Windows Kernel mode drivers to find vulnerabilities
  • Learn the exploit development process in Kernel mode
  • Understand how a vulnerability looks like in driver code
  • Understand how a vulnerability can be mitigated

Course Content

Windows Internals

  • Windows NT Architecture
  • Executive
  • Kernel
  • Hardware Abstraction Layer (HAL)
  • Privilege Rings
  • Key Data Structures

Memory Management

  • Virtual Address Space
  • Kernel Stack
  • Memory Pool
  • Pool Allocator

Why to Attack Kernel?

  • User Mode vs Privileged Mode
  • User Mode Exploit Mitigations

Windows Driver Basics

  • I/O Request Packet (IRP)
  • I/O Control Code (IOCTL)
  • Data Buffering

Windows Kernel Debugging

  • Setup Kernel Debugging
  • Setup Debugging Symbols
  • WinDbg-Fu

Fuzzing Windows Kernel

  • IOCTL Fuzzing

Exploitation

  • Pool Overflow
  • Use after Free
  • Arbitrary Overwrite

Kernel Payload

  • Escalation of Privilege Payload
  • Kernel Recovery

Miscellaneous

  • Q/A and Feedback

Who should attend?

  • Information Security Professionals
  • Anyone with an interest in understanding Windows Kernel exploitation
  • Ethical Hackers and Penetration Testers looking to upgrade their skill-set to the kernel level

Why attend?

Upon completion of this training, participants will be able to:

  • Understand how kernel and kernel mode driver works
  • Understand exploitation techniques for different software vulnerabilities
  • Understand how Windows Pool Allocator works in order to write reliable exploit for complex bugs like Pool Overflow(s) and Use After Free(s)
  • Learn to write own exploits for the found vulnerabilities in Kernel or Kernel mode drivers
  • Understand vulnerabilities in terms of code and mitigations applied to fix the vulnerabilities

Prerequisites

  • Basics of User Mode Exploitation
  • Basics of x86 Assembly and C/Python
  • Familiarity with Vmware/VirtualBox
  • Familiarity with WinDbg
  • Patience

Hardware & Software Requirement

  • A laptop capable of running two virtual machines simultaneously (8 GB of RAM)
  • 40 GB free hard drive space
  • Everyone should have Administrator privilege on their laptop

What to Expect?

  • Complete Hands-on
  • Fast & Quick Overview of Windows Internals
  • WinDbg-Fu
  • Windows Kernel Drivers Basics/IOCTL/IRP
  • Techniques to Exploit Windows Kernel/Driver vulnerabilities

What Not to Expect?

  • Elite Kernel Hacker in two/three day(s)
  • Basics of ASM/C/Python

About the Trainer

Ashfaq Ansari

Ashfaq Ansari is the founder of HackSys Team code named "Panthera". He has experience in various aspects of Information Security. He has authored "HackSys Extreme Vulnerable Driver" and "Shellcode of Death". He has also written and published various white papers on low level software exploitation. His core interest lies in Low Level Software Exploitation both in User and Kernel Mode, Vulnerability Research, Reverse Engineering, Program Analysis and Hybrid Fuzzing. He is a fanboy of Artificial Intelligence and Machine Learning. He is the chapter lead for null (Pune).

Want to connect with Ashfaq?

You may find Ashfaq on these social networks :

http://null.co.in/profile/411-ashfaq-ansari
https://twitter.com/HackSysTeam
http://hacksys.vfreaks.com/
https://github.com/hacksysteam

Copyright © 2023 | Nullcon India | International Security Conference | All Rights Reserved