36
MS Windows – KILL BILL Prathan Phongthiproek ACIS Professional Center Senior Information Security Consultant March 20 th , 2010

Hacker Space

Embed Size (px)

DESCRIPTION

MS Windows - Kill Bill

Citation preview

Page 1: Hacker Space

MS Windows – KILL BILL

Prathan PhongthiproekACIS Professional CenterSenior Information Security ConsultantMarch 20 th, 2010

Page 2: Hacker Space

Instructor / Speaker Red Team : Penetration Tester (Team Leader) Security Consultant / Researcher CWH Underground Exploits and Vulnerabilities Disclosure

Milw0rm, Exploit-db, Security Focus, Secunia, Zeroday, etc

Who am I ?

Page 3: Hacker Space

Overview

Remote Attack MS Windows OS

The Message From Slave to God

MS Office Evil

Internet Explorer Pwn2Own

USB Autorun Attack

Local Buffer Overflow

Page 4: Hacker Space

Microsoft Windows is SUCK !!

Why MS Windows is SUCK ???

NetBIOS Null Sessions -> The Holy Grail of Windows Hacking

See Movie “Pirates of Silicon Valley”

Page 5: Hacker Space

Remote Microsoft Windows Vulnerabilities !!

Buffer Overrun In RPC Interface (MS03-026)

Buffer Overrun In RPCSS Service (MS03-039)

Vulnerability in LSASS service (MS04-011)

Vulnerability in Plug and Play (MS05-039)

Vulnerability in Server Service (MS06-040)

Vulnerability in Server Service Relative Path Corruption (MS08-067)

Vulnerability in SMBv2 Command Value (MS09-050)

Not Include DOS Exploit

Page 6: Hacker Space

MS Windows RPC Vulnerability MS08-067

“PoC’s work against Windows XP SP2, Windows XP SP3 and Windows 2003 Server SP2 machines”

Page 7: Hacker Space

MS Windows SMB2 Vulnerability MS09-050

“PoC’s work against Windows Vista SP1/2, Windows 2008 SP1/2 (Not R2) and Windows 7 (RC) machines”

Page 8: Hacker Space

MS Windows – Defensive

Page 9: Hacker Space

MS Windows – Defensive

Page 10: Hacker Space

Gaining Access without Exploit

Page 11: Hacker Space

Exploit MS Vista (MS09-050)

Page 12: Hacker Space

The Message From Slave to God

Get The Hell Outta Here !!Get The Hell Outta Here !!

Page 13: Hacker Space

MS Windows NT #GP Trap Handler Allows Users to Switch Kernel Stack

An error exists within the #GP trap handler (nt!KiTrap0D)

An error exists within the Windows kernel not correctly resetting a pointer when freeing memory

Affect every release of the Windows NT kernel (Window 2000, XP, Server 2003, Vista, Server 2008, 7)

Non-Affect : Windows 7 (64-bit), Windows Server 2008 (64-bit, Itanium)

Patch release MS10-015 on Feb 09 2010

0-day for 1 month. W00t ! W00t !

KiTra0d – Local Ring0 Kernel Exploit

Page 14: Hacker Space

KiTra0d – Local Ring0 Kernel Exploit

Page 15: Hacker Space

Token - Web Cookies (Credentials When RDP, MAP Network Drive)

On Windows XP / 2003 – Windows Service run as SYSTEM account Compromise of a Service == Full System Compromise

On Windows Vista / 2008 - LocalService / NetworkService == System

Affect every release of the Windows NT kernel (Window 2000, XP, Server 2003, Vista, Server 2008, 7)

Patch release MS09-012 on April 14 2009

0-day for 1 year. W00t ! W00t !

Black hat Mind !! Combine Attack Layer 8 + KiTrap0d + Token Kidnapping

Token Kidnapping – Elevate Privilege

Page 16: Hacker Space

MS Office (Evil Macro)

MS Office is Evil !!

Page 17: Hacker Space

MS Office (Evil Macro)

Page 18: Hacker Space

MS Office (Evil Macro)

Page 19: Hacker Space

MS Office (Evil Macro)

Page 20: Hacker Space

Internet Explorer Pwn2Own

Page 21: Hacker Space

Internet Explorer Pwn2Own

Page 22: Hacker Space

Internet Explorer Pwn2Own

Page 23: Hacker Space

Internet Explorer Pwn2Own

Page 24: Hacker Space

Internet Explorer Pwn2Own

Page 25: Hacker Space

Internet Explorer Pwn2Own - ActiveX

Page 26: Hacker Space

USB Autorun Attack

Autoplay NOT Autorun

Page 27: Hacker Space

USB Autorun Attack

Turn Off Autoplay -> It’s still vulnerable from evil usb

Page 28: Hacker Space

USB Autorun Attack

Page 29: Hacker Space

USB Autorun Attack

Page 30: Hacker Space

USB Autorun Attack

\HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer

0xff

Page 31: Hacker Space

USB Autorun Attack

Page 32: Hacker Space

USB Autorun Attack

Page 33: Hacker Space

Local Buffer Overflow

Page 34: Hacker Space

Local Buffer Overflow

Page 35: Hacker Space

Local Buffer Overflow

Page 36: Hacker Space

See you at Citec-Con 3… Q&A

THANK YOU