Kernel Pool allocator plays a significant role. Since Windows 7, Microsoft has been starting to improve the kernel kernel pool allocator. It’s a little bit different. In Windows 8, however, Microsoft has eliminated any corrupted kernel pool corruptions. It is a technique by the artist.
It is a common effort by Intel. It is interposed between the hardware and the BIOS.
This is a presentation of the Windows 8 x64 version of the UEFI firmware: Dreamboot. Dreamboot has two specific payloads: Privilege escalation and Windows local authentication bypass. It is a bug that comes in the form of a physical attack (i.e., DVD or USB ports). It is also fully functional in virtualized environments like VMWare Workstation or ESX.
The UEFI platforms use the TIC and the security risks. It makes it possible for the UEFI to boot.
The most common way to bypass digital signature verification for kernel modules during the OS boot process is to use bootkit functionality. I have already covered in my publications technologies that are used to modify the MBR or VBR. But with the increasing penetration of Win8 and SecureBoot's trusted boot technology, it only spurred security researchers to focus in a different direction. Just yesterday, another DreamBoot bootbit concept for UEFI appeared, which comes in source code and is publicly available. Unlike the variety of BIOS varieties, there is a generally accessible standard for UEFI that developers are trying to adhere to. And if in the case of BIOS modifications for mass attacks, there was a question of compatibility of the developed extension modules, then for UEFI everything is standardized and the future of this kind of mass attacks is quite real.
For motherboard manufacturers, UEFI is a significant step forward. Compared to the BIOS, UEFI is much easier to use because the code can be written in C. A big step forward compared to the BIOS, for which you can only program in a 16-bit assembler.
In order to use UEFI, manufacturers will have to completely rewrite their BIOS code base, which has been in use for 30 years. So it will take significant time to move from one platform to another. Even today there are many manufacturers that continue to release BIOS instead of UEFI for motherboards. The fact that the growth of the PC market has been slowing down lately will not be good news for UEFI manufacturers.
The fact that resellers like Peter Kleissner, Saferbytes, LEAD82 and Quarkslabs explore the bootkit theme is, in fact, good news for the security industry as a whole. We need to understand where potential vulnerabilities are to prevent intruders from using them, as we have seen in cases with TDL4, Cidox or Gapz. Thus, with the time of the spread of UEFI, attackers will sooner or later also be guided by this platform. So we will be better prepared when this happens.
Source: https://habr.com/ru/post/176055/
All Articles