Project Zero: Injecting Code into Windows Protected Processes using COM

Discussion in 'other security issues & news' started by WildByDesign, Oct 16, 2018.

  1. WildByDesign

    WildByDesign Registered Member

    Joined:
    Sep 24, 2013
    Posts:
    2,587
    Location:
    Toronto, Canada
    Project Zero: Injecting Code into Windows Protected Processes using COM - Part 1
    By James Forshaw of Google's Project Zero
    Link: https://googleprojectzero.blogspot.com/2018/10/injecting-code-into-windows-protected.html


     
  2. Rasheed187

    Rasheed187 Registered Member

    Joined:
    Jul 10, 2004
    Posts:
    17,559
    Location:
    The Netherlands
    Haven't read it yet, but there are way too money ways to inject code, Windows needs to be rewritten. :gack:
     
  3. EASTER

    EASTER Registered Member

    Joined:
    Jul 28, 2007
    Posts:
    11,126
    Location:
    U.S.A. (South)
    I been saying the same for a long time. We just have to play with the cards (code) that Microsoft Windows dealt us and will deal going forward in spite of the tons of new intrusion entry finds that will continue to crop up. That's why I always consider their systems and code a basic framework from the start and it still is and will be in it's current code structures.

    Thanks @WildByDesign for this article. COM was popular for tapping into Windows 98 back when, so I suspect many who even do security probes can also always reach back and find that much of what was, can still be used again in these updated newer versions with more clever modifications to reach goals or expose weaknesses today.

    You just gotta luv how those Recon researchers continue to intelligently dissect Windows workings and in turn their findings can prove very constructive to developing methods to pin back or prevent those potential issues in the future. :)
     
  4. itman

    itman Registered Member

    Joined:
    Jun 22, 2010
    Posts:
    8,593
    Location:
    U.S.A.
    PPL is a joke and bypassing it is well known.
     
  5. Rasheed187

    Rasheed187 Registered Member

    Joined:
    Jul 10, 2004
    Posts:
    17,559
    Location:
    The Netherlands
    I wouldn't call it a joke, I think it's an interesting feature. I wish more security tools would make use of it. For example, MemProtect will let you protect certain processes against code injection. But I'm not sure if you can make exceptions, for example what if you want to protect your browser with HMPA or Sandboxie, they both need to inject code.

    https://excubits.com/content/en/products_memprotect.html
     
  6. WildByDesign

    WildByDesign Registered Member

    Joined:
    Sep 24, 2013
    Posts:
    2,587
    Location:
    Toronto, Canada
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.