Fooling Windows through Superfetch

Subscribers:
5,970
Published on ● Video Link: https://www.youtube.com/watch?v=QrSvOpNccKg



Duration: 40:41
8 views
0


Mathilde Venault | Engineering Student, ESIEA
Baptiste David | PhD Student, ESIEA
Date: Thursday, August 6 | 10:00am-10:40am
Format: 40-Minute Briefings
Tracks: Data Forensics & Incident Response, Reverse Engineering

Have you ever tried to hide your traces after doing some obscure stuff on a computer? We usually think about cleaning histories, file lefts, event viewer, DNS cache, and registry keys but have you ever thought about Superfetch?

This is a Windows service whose purpose is to increase the speed of user's experience. Superfetch will analyze user's software use to prelaunch the process next time the user might need it. It also includes files used by the program such as text documents, photos, and movies. In concrete terms, the service tracks every activity on the OS and records traces into files with a ".pf " extension, called scenarios. Whenever Superfetch wants to predict which program might be launched, it will consult its prefetch files, computes probabilities and then tries to predict user decisions. This constitutes a forensic gold mine for any governmental service or any malicious person since it raises a very serious privacy issue.

In this talk, we will dive into Superfetch architecture, explain its operating method, and debunk all the myths surrounding it. In addition, we will detail the format of its inner files which were undocumented or obsolete up until now and we will show how to fool the system by editing these files. To this end, we have built a tool that allows accessing and falsifying the data of the scenarios without Windows noticing. Afterwards, the system incorporates the falsified data and processes it as the original. Thanks to this trick, you will be able to hide traces of your activity, lie to forensic analysis, or even create false evidence on a computer. Your system believes it knows everything about you: time has come to regain power.

Black Hat - USA - 2020 Hacking conference
#hacking, #hackers, #infosec, #opsec, #IT, #security




Other Videos By All Hacking Cons


2022-01-09Exploiting Kernel Races through Taming Thread Interleaving
2022-01-09Needing the DoH: The Ongoing Encryption and Centralization of DNS
2022-01-09Building Cyber Security Strategies for Emerging Industries in Sub Saharan Africa
2022-01-09FASTCash and INJX Pure How Threat Actors Use Public Standards for Financial Fraud
2022-01-09CloudLeak: DNN Model Extractions from Commercial MLaaS Platforms
2022-01-09NoJITsu: Locking Down JavaScript Engines
2022-01-09Carrying our Insecurities with Us The Risks of Implanted Medical Devices in Secure Spaces
2022-01-09Finding New Bluetooth Low Energy Exploits via Reverse Engineering Multiple Vendors' Firmwares
2022-01-09Compromising the macOS Kernel through Safari by Chaining Six Vulnerabilities
2022-01-09Office Drama on macOS
2022-01-09Fooling Windows through Superfetch
2022-01-09A Decade After Stuxnet's Printer Vulnerability Printing is Still the Stairway to Heaven
2022-01-09Decade of the RATs Custom Chinese Linux Rootkits for Everyone
2022-01-09Hacking Public Opinion
2022-01-09IMP4GT IMPersonation Attacks in 4G NeTworks
2022-01-09A Framework for Evaluating and Patching the Human Factor in Cybersecurity
2022-01-09Demigod The Art of Emulating Kernel Rootkits
2022-01-09A Hacker's Guide to Reducing Side Channel Attack Surfaces Using Deep Learning
2022-01-09Improving Mental Models of End to End Encrypted Communication
2022-01-09Hacking the Supply Chain The Ripple20 Vulnerabilities Haunt Tens of Millions of Critical Devices
2022-01-09Industrial Protocol Gateways Under Analysis



Tags:
data
hacker
security
computer
cyber
internet
technology
hacking
attack
information
hack
network
scam
fraud
malware
secure
criminal
phishing
software
access
theft
system
firewall
communication
privacy
binary
account
spy
programmer
program
spyware
hacked
hacking conference
conference
learn
how to
2022
2021
cybersecurity
owned
break in
google
securing
exploit
exploitation
recon
social engineering
Mathilde Venault
Baptiste David
Reverse Engineering
Data Forensics & Incident Response