Divide et Impera MemoryRanger Runs Drivers in Isolated Kernel Spaces

Subscribers:
6,440
Published on ● Video Link: https://www.youtube.com/watch?v=mb4Nq5bmJ_0



Duration: 50:33
2 views
0


In Windows 10, Microsoft is introducing a new memory protection concept: Windows Defender Device Guard, which provides code integrity for all modules in the kernel-mode, while PatchGuard prevents patching the kernel. These features do not protect the kernel-mode memory completely. Malware can steal and modify allocated memory of third-party drivers without any BSOD. Also, elevating process privileges by patching EPROCESS.Token does not cause a BSOD. The reason for that is that kernel-mode drivers share the same memory space with the rest of the kernel. Security researchers are trying to fill this gap. For example "LKRG" provides only code integrity without any protection of allocated memory, while AllMemPro protects allocated memory but not the code. "LKM guard" does not restrict the OS kernel. "Hypernel" provides kernel integrity, but only for limited kernel objects. The goal is to move kernel-mode drivers into separate memory enclosures. This is possible by applying VT-x and EPT features. As a result, guest-physical addresses are translated by traversing a set of EPT paging structures. The EPT feature provides trapping memory access attempts, redirecting them, as well as allocating several EPT structures with various access configurations. This idea is implemented in MemoryRanger (MR) in the following way: Initially MR allocates the default EPT structure and puts all loaded drivers and kernel inside it. After a new driver is loaded, MR allocates and configures a new EPT structure so that only this new driver and OS kernel are executed here. Each time after this driver allocates memory MR updates all EPTs: the allocated memory is accessible only for this driver, while all other EPTs exclude this memory. MR skips the legal memory access attempts and prevents the illegal ones. MR isolates execution of drivers by switching between EPTs. The source code and demo of MemoryRanger are here – https://github.com/IgorKorkin/MemoryRanger, https://www.youtube.com/watch?v=IMePtijD3TY&vq=hd1080.
Presenters:
Igor Korkin - Independent Researcher, \
Igor Korkin, Ph.D. is a security researcher from Moscow, Russia. He graduated from National Research Nuclear University MEPhI (Moscow Engineering Physics Institute), Department of Cryptology and Cyber Security (#42). His thesis dealt with the detection of hidden hardware-based hypervisors. He has been in cybersecurity for about 10 years researching rootkits detection, memory forensics, and Windows OS Kernel security. His results were presented at five ADFSL conferences in the USA and once at REcon in Canada. He is a fan of cross-disciplinary academic research in cybersecurity and he is looking for a team to do new research and present the results.Black Hat - Europe - 2018
Hacking conference
#hacking, #hackers, #infosec, #opsec, #IT, #security




Other Videos By All Hacking Cons


2021-12-21Under the SEA A Look at the Syrian Electronic Army's Mobile Tooling
2021-12-21Decisions and Revisions The Ever Evolving Face of the Black Hat NOC
2021-12-21Video Killed the Text Star OSINT Approach
2021-12-21Deep Impact Recognizing Unknown Malicious Activities from Zero Knowledge
2021-12-21A Measured Response to a Grain of Rice
2021-12-21Secure Boot Under Attack Simulation to Enhance Fault Attacks & Defenses
2021-12-21When Everyone's Dog is Named Fluffy Black Hat - Europe - 2018
2021-12-21DeepPhish Simulating Malicious AI Black Hat - Europe - 2018
2021-12-21Locknote Conclusions and Key Takeaways from Black Hat Europe 2018
2021-12-21When Machines Can't Talk Black Hat - Europe - 2018
2021-12-21Divide et Impera MemoryRanger Runs Drivers in Isolated Kernel Spaces
2021-12-21AI Gone Rogue Exterminating Deep Fakes Before They Cause Menace
2021-12-21Where 2 Worlds Collide Bringing Mimikatz et al to UNIX
2021-12-21Malware Buried Deep Down the SPI Flash Sednit's First UEFI Rootkit Found in the Wild
2021-12-21Attacking and Defending Blockchains From Horror Stories to Secure Wallets
2021-12-21Straight Outta VMware Modern Exploitation of the SVGA Device for Guest to Host Escapes
2021-12-21Network Defender Archeology An NSM Case Study in Lateral Movement with DCOM
2021-12-21Attacking Hardware Systems Using Resonance and the Laws of Physics
2021-12-21The Last Line of Defense Understanding and Attacking Apple File System on iOS
2021-12-21Eternal War in XNU Kernel Objects Black Hat - Europe - 2018
2021-12-21Evolving Security Experts Among Teenagers Black Hat - Europe - 2018



Tags:
data
hacker
security
computer
cyber
internet
technology
hacking
attack
digital
virus
information
hack
online
crime
password
code
web
concept
thief
protection
network
scam
fraud
malware
secure
identity
criminal
phishing
software
access
safety
theft
system
firewall
communication
business
privacy
binary
account
spy
programmer
program
spyware
hacked
hacking conference
conference
learn
how to
2022
2021
cybersecurity
owned
break in
google
securing
exploit
exploitation
recon
social engineering