j00ru vx tech blog
January 16th, 2010, 20:18
Hi there!
Not so long (a few weeks, actually) ago, me together with Gynvael Coldwind ("http://gynvael.coldwind.pl/") had a chance to carry out a research regarding the Global and Local Descriptor Tables being used as a write-what-where target, while exploiting ring-0 vulnerabilities on 32-bit Microsoft Windows NT-family systems. The result of our work is a small article, describing the actual steps taken in order to escalate the privileges through GDT/LDT. As usual, exemplary source code snippets are available (attached to the document), so that the reader can check their effectiveness on his own.
I would like to say THANK YOU to Unavowed ("http://unavowed.vexillium.org/") and Agnieszka Zerka ("http://aishikami.wordpress.com") for their comments and help in the process of assembling this publication.
A complete package, including a PDF file "GDT and LDT in Windows kernel vulnerability exploitation" (with the source.zip file enclosed to the paper) can be downloaded from here ("http://vexillium.org/dl.php?call_gate_exploitation.pdf") (682 kB).
Content:
1. Abstract
2. The need of a stable exploit path
3. Windows GDT and LDT
4. Creating a Call-Gate entry in LDT
4.1. 4-byte write-what-where exploitation
4.2. 1-byte write-what-where exploitation
4.3. Custom LDT goes User Mode
5. Summary
+ References
+ Attachments
Have fun && Leave your comments!
http://j00ru.vexillium.org/?p=290&lang=en
Not so long (a few weeks, actually) ago, me together with Gynvael Coldwind ("http://gynvael.coldwind.pl/") had a chance to carry out a research regarding the Global and Local Descriptor Tables being used as a write-what-where target, while exploiting ring-0 vulnerabilities on 32-bit Microsoft Windows NT-family systems. The result of our work is a small article, describing the actual steps taken in order to escalate the privileges through GDT/LDT. As usual, exemplary source code snippets are available (attached to the document), so that the reader can check their effectiveness on his own.
I would like to say THANK YOU to Unavowed ("http://unavowed.vexillium.org/") and Agnieszka Zerka ("http://aishikami.wordpress.com") for their comments and help in the process of assembling this publication.
A complete package, including a PDF file "GDT and LDT in Windows kernel vulnerability exploitation" (with the source.zip file enclosed to the paper) can be downloaded from here ("http://vexillium.org/dl.php?call_gate_exploitation.pdf") (682 kB).
Content:
1. Abstract
2. The need of a stable exploit path
3. Windows GDT and LDT
4. Creating a Call-Gate entry in LDT
4.1. 4-byte write-what-where exploitation
4.2. 1-byte write-what-where exploitation
4.3. Custom LDT goes User Mode
5. Summary
+ References
+ Attachments
Have fun && Leave your comments!
http://j00ru.vexillium.org/?p=290&lang=en