Turning (Page) Tables: Bypassing Kernel Mitigations to Successfully Escalate Privileges

Discussion in 'other security issues & news' started by Rasheed187, Aug 25, 2018.

  1. Rasheed187

    Rasheed187 Registered Member

    Joined:
    Jul 10, 2004
    Posts:
    17,559
    Location:
    The Netherlands
  2. EASTER

    EASTER Registered Member

    Joined:
    Jul 28, 2007
    Posts:
    11,126
    Location:
    U.S.A. (South)
    Fantastic read on escalating, the kernel bypassing, and even lower realms as browsers. Thanks a bunch, good article!

    Seems it's back to the basics-computer code of today's main uses just has inherently a myriad of avenues/choices for anyone, unfortunately the shadier bunch has a key in the keyhole for many of those.

     
  3. itman

    itman Registered Member

    Joined:
    Jun 22, 2010
    Posts:
    8,593
    Location:
    U.S.A.
    Another VBS bypass.

    Believe Microsoft made a tactical error by enabling VBS/HVCI on its non-Enterprise versions. As such, its in the pen-testers "bypass bullseye."

    Also just one more instance of the never ending Microsoft "band aid" security mitigation approach to Windows. Rather than totally rewritting the OS from scratch with security being the most important factor.
     
  4. EASTER

    EASTER Registered Member

    Joined:
    Jul 28, 2007
    Posts:
    11,126
    Location:
    U.S.A. (South)
    Well, by all means @itman don't forget to include performance being an important (howbeit not quite as equal) a factor as well.

    We all been waiting on the syncing of both yet they always seem to while making inroads and improve on one (WD), it's at the expense of introducing another performance hog (Cortana, extra features etc) which in turn also "CAN" also affect/delay security. Arggggg
     
    Last edited: Aug 25, 2018
  5. itman

    itman Registered Member

    Joined:
    Jun 22, 2010
    Posts:
    8,593
    Location:
    U.S.A.
    On that regard if MS put in the same effort into securing Win 10 as they do in gathering user telemetry, pushing apps, etc.($$$), then we all could do something more meaningful than worrying about the next malware that will nail out PCs.
     
  6. Rasheed187

    Rasheed187 Registered Member

    Joined:
    Jul 10, 2004
    Posts:
    17,559
    Location:
    The Netherlands
    LOL, good point. I wonder if M$ if is going to fix this one, I have no idea how difficult it will be. To be fair, the same technique probably also works in Linux and macOS.
     
  7. itman

    itman Registered Member

    Joined:
    Jun 22, 2010
    Posts:
    8,593
    Location:
    U.S.A.
    If you read the Ensilo article carefully, they note that this bypass will work outside of VBS protected apps. So it is not so much a VBS bypass as it is a virtual memory vulnerability. You can read about Windows memory protection here: https://docs.microsoft.com/en-us/windows/desktop/memory/memory-protection
     
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.