Thread Rating:
  • 1 Vote(s) - 5 Average
  • 1
  • 2
  • 3
  • 4
  • 5
Project Zero: Injecting Code into Windows Protected Processes using COM - Part 1
#1
Information 
[Image: dDW55mQLL7GDzFcHGMyI3qjy5bW9Ys2dfOZk3-lP...mWShBVG4ON]
Quote:At Recon Montreal 2018 I presented “Unknown Known DLLs and other Code Integrity Trust Violations” with Alex Ionescu. We described the implementation of Microsoft Windows’ Code Integrity mechanisms and how Microsoft implemented Protected Processes (PP). As part of that I demonstrated various ways of bypassing Protected Process Light (PPL), some requiring administrator privileges, others not.

In this blog I’m going to describe the process I went through to discover a way of injecting code into a PPL on Windows 10 1803. As the only issue Microsoft considered to be violating a defended security boundary has now been fixed I can discuss the exploit in more detail.

Background on Windows Protected Processes


The origins of the Windows Protected Process (PP) model stretch back to
Vista where it was introduced to protect DRM processes. The protected process model was heavily restricted, limiting loaded DLLs to a subset of code installed with the operating system. Also for an executable to be considered eligible to be started protected it must be signed with a specific Microsoft certificate which is embedded in the binary. One protection that the kernel enforced is that a non-protected process couldn’t open a handle to a protected process with enough rights to inject arbitrary code or read memory.
Full reading: https://googleprojectzero.blogspot.com/2...ected.html
[-] The following 2 users say Thank You to harlan4096 for this post:
  • Der.Reisende, silversurfer
Reply


Forum Jump:


Users browsing this thread: 1 Guest(s)
[-]
Welcome
You have to register before you can post on our site.

Username/Email:


Password:





[-]
Recent Posts
nternet Download Manager 6.42 Build 9
Changes in 6.42 Bu...harlan4096 — 06:45
Ubuntu 24.04 LTS / 23.10
Ubuntu 24.04 LTS /...harlan4096 — 06:44
Mozilla Thunderbird 125.0
Mozilla Thunderbir...harlan4096 — 06:43
AMD Radeon Software Adrenalin 24.4.1
Highlights New ...harlan4096 — 06:41
AV-TEST - Cybersecurity: Defense Against...
AV-TEST - Cybersec...harlan4096 — 06:40

[-]
Birthdays
Today's Birthdays
avatar (49)steakelask
avatar (43)Termoplenka
Upcoming Birthdays
avatar (49)Toligo

[-]
Online Staff
There are no staff members currently online.

>