"Abusing the NT Kernel Shim Engine" by Alex Ionescu at REcon 2016

Subscribers:
8,140
Published on ● Video Link: https://www.youtube.com/watch?v=qCa9icMqBNM



Duration: 59:49
3,454 views
57


"Abusing the NT Kernel Shim Engine" by Alex Ionescu at REcon 2016
This video was provided by Sébastien Duquette and http://recon.cx.
This video is licensed under Creative commons CC-BY.

The Kernel Shim Engine is the kernel’s analogue to the user-mode shim engine (ShimEng). Although the latter now has had some pretty good research done on it, the KSE remains a mystery. First introduced in Windows XP as merely a Plug-and-Play compatibility layer for custom registry flags, it morphed into a nearly-full blown Shim Engine implementation, with the ability to misuse it for both persistence and stealth hooks in the kernel. In this talk, you’ll learn how to use the KSE for hooking drivers (dispatch tables, IRPs, and entrypoints) as well as kernel APIs both legitimatelly and illegitimately. You’ll also see some WinDBG scripts & techniques for detecting and enumerating installed kernel shims for forensic purposes. Finally, a tool called DriverMon is planned for release at the conference, which uses the KSE to provide ProcMon for Drivers.







Tags:
reactos
libre software
free software
free operating system
libre operating system
windows nt
windows 10
winehq
open source
gpl
bsd license