Extreme Privilege Escalation on Windows 8 UEFI Systems

Subscribers:
5,970
Published on ● Video Link: https://www.youtube.com/watch?v=oRtU0Y0keKI



Duration: 57:01
3 views
0


The UEFI specification has more tightly coupled the bonds of the operating system and the platform firmware by providing the well-defined "runtime services" interface between the operating system and the firmware.

This interface is more expansive than the interface that existed in the days of conventional BIOS, which has inadvertently increased the attack surface against the platform firmware. Furthermore, Windows 8 has introduced APIs that allow accessing this UEFI interface from a userland process. Vulnerabilities in this interface can potentially allow a userland process to escalate its privileges from "ring 3" all the way up to that of the platform firmware, which includes permanently attaining control of the very-powerful System Management Mode (SMM).

This talk will disclose two of these vulnerabilities that were discovered in the Intel provided UEFI reference implementation, and detail the unusual techniques needed to successfully exploit them.

PRESENTED BY
Corey Kallenberg, Xeno Kovah, John Butterworth, Samuel Cornwell

Black Hat - USA - 2014 Hacking conference
#hacking, #hackers, #infosec, #opsec, #IT, #security







Tags:
data
hacker
security
computer
cyber
internet
technology
hacking
attack
information
hack
password
code
web
protection
malware
secure
identity
software
access
safety
system
firewall
communication
business
binary
programmer
program
spyware
hacked
hacking conference
conference
learn
how to
2022
cybersecurity
owned
break in
google
securing
exploit
exploitation
recon
social engineering
Corey Kallenberg
Xeno Kovah
John Butterworth
Samuel Cornwell
Windows 8
privilege escalation
UEFI