15
Windows Handle somma_at_vmcraft_dot_com VMCraft inc., Ltd. 2008. 11. 15

Windows Handle

  • Upload
    lucian

  • View
    44

  • Download
    5

Embed Size (px)

DESCRIPTION

Windows Handle. somma _at_ vmcraft _dot_ com VMCraft inc., Ltd. 2008. 11. 15. Contents. Windows kernel architecture Object ? Handle table Reversing the PspCidTable Exploit #1 Exploit #2. Applications. Subsystem servers. DLLs. System Services. Login/GINA. Kernel32. - PowerPoint PPT Presentation

Citation preview

Page 1: Windows Handle

Windows Handle

somma_at_vmcraft_dot_comVMCraft inc., Ltd.

2008. 11. 15

Page 2: Windows Handle

Contents

Windows kernel architectureObject ?Handle tableReversing the PspCidTableExploit #1 Exploit #2

Page 3: Windows Handle

Windows kernel architecture

User-mode

Kernel-mode Trap interface / LPC

ntdll / run-time library

Win32 GUIProcs & threads

Kernel run-time / Hardware Adaptation Layer

Virtual memoryIO ManagerSecurity refmon

Cache mgr

File filters

File systems

Volume mgrs

Device stacks

Scheduler

Kernel32 User32 / GDI

DLLs

Applications

System Services

Object Manager / Configuration Management

FS run-time

exec synchr

Subsystemservers

Login/GINA

Critical services

Page 4: Windows Handle

Object ?

Page 5: Windows Handle

Object structure

Page 6: Windows Handle

DEMO - Digging windows object

Page 7: Windows Handle

HANDLE ?

Page 8: Windows Handle

Handle table

Page 9: Windows Handle

Handle table structure

Page 10: Windows Handle

Handle table structure

Page 11: Windows Handle

Reversing the PspCidTableHandle table contains every Process and Thread object.

Page 12: Windows Handle

DEMO - Reversing windows kernel

Page 13: Windows Handle

Exploit #1 OpenProcess() trick

Page 14: Windows Handle

Exploit #2 process hiding

Page 15: Windows Handle

Q & A