SlideShare a Scribd company logo
FROM KERNEL ESCAPE TO SYSTEM CALC
This Time Font
hunt you down
in 4 bytes!
@zer0mem@promised_lu
一步一步
TTF
 what ?
 Pinging TTF
 Different
 start to play
 wild overflow
TECHNIQUE
 data to kernel
 bitmap wants to help!
 bit of math instead write-what
 ruling of bitmap!
 x64, KASLR, NX, SMEP, SMAP, CFG
 echo from the past
 have we problems, security ?
#whoarewe [ KEEN TEAM ]
 We are doing sec research
 We like challenges & security
 pwn2own 2013 / 2014 / 2015
 actively contributing to geek community
 working with project zero
 cve / techs / blog / tools / codes / conferences
 GeekPwn organizer
 #shanghai #beijing
Practical Example
NoSuchCon :
http://www.slideshare.net/PeterHlavaty/
attack-on-the-core
SyScan :
http://www.slideshare.net/PeterHlavaty/
back-to-the-core
http://www.nosuchcon.org/ https://syscan.org/ https://www.syscan360.org/
we were talking before of some issues in kernel … … this time we will show it in practice
TTF, what is that ?
TRUE TYPE FORMAT
TrueType is an outline font standard developed
by Apple and Microsoft in the late 1980s as a
competitor to Adobe's Type 1 fonts used in
PostScript. It has become the most common
format for fonts on both the Mac
OS and Microsoft Windows operating systems.
The primary strength of TrueType was originally
that it offered font developers a high degree of
control over precisely how their fonts are
displayed, right down to particular pixels, at
various font sizes. With widely
varying rendering technologies in use today,
pixel-level control is no longer certain in a
TrueType font.
…
THIS TOOL (IS) FABULOUS
Offers VM, where in certain conditions you can
with your controlled VM instructions achieve :
◦ READ
◦ WRITE
In certain scenario it offers boosting
surrounding structures in the same pool, what
can leads to :
◦ READ
◦ WRITE
+ some other offering in certain conditions
Ok that was .. lazy [ background ]
Nice internals in attackers perspective :
https://cansecwest.com/slides/2013/Analysis%20of%20a%20Windows%20Kernel%20Vuln.pdf
Fuzzing fonts, structure info .. :
https://digteam.github.io/assets/tocttou.pdf
https://media.blackhat.com/us-13/US-13-Chan-Smashing-The-Font-Scaler-Engine-in-Windows-
Kernel-Slides.pdf
Pinging TTF
January meeting
about pwn2own
February decided we will
go after our TTF bugs
March pwn2own, 2 kernel
escapes to system calcs
 building novel TTF fuzzer (@promised_lu)
 let fuzzer run for 3 weeks
 3 *exploitable* bugs discovered at that period
 3-4 weeks for 2 kernel escapes by TTF
 more bugs discovered waiting for review now
This time bit different
TTF from the past
 Bug to modify state of virtual machine
 Using VM instructions to pwn kernel
this TTF
 Bug in building state of VM
 Sequence of instruction (4b) to trigger bug
 No more control from VM :
Shall we play a game ?
#tools & #materials
You will need to parse TTF : TTX
You will need to understand format
to build your own parser / update-er :
View it in human quick & understandable way :
FarManager / ConEmu & plugins
https://pypi.python.org/pypi/FontTools & https://github.com/behdad/fonttools/ http://www.farmanager.com/ https://twitter.com/ConEmuMaximus5
http://www.microsoft.com/typography/otspec/otff.htm
Minimize your problem!
1. As you got crash, problem can be
everywhere
2. Build parsing tools (or use existing ones)
3. Kick all part what is not necessary from
TTF out
4. Start working on minimalized TTF
https://media.blackhat.com/us-13/US-13-Chan-Smashing-The-Font-Scaler-Engine-in-Windows-Kernel-Slides.pdf
gotcha! Wild Overflow
 finally we got root cause!
 Only XX pages to be overflowing in
 need to alter XX pages in kernel pool without crash ?!
No interaction from VM is possible anymore
Take it easy ?!
x64
 got overflow
 Must control data after
 x64 introduce a lot of gaps
 Spraying as was used before is
ineffective
 But …
 …not in the same pool
http://www.alex-ionescu.com/?p=246
Look at your pool
Conditional breakpoint command on ExAllocatePool-0x21 on big allocs & results
controlled size & at byte level
Big Pools
RANDOMIZATION
 Not at big pools
 Making controlled holes at will
 Precise pool layout
SPRAYING
 still highly effective inside targeted pool
 if you know base of pool, you can hardcode
 kmalloc & kfree at your will
wild overflow is no problem anymore!
By Design #1 [ overflows ]
1. Do pool layout
I. spray bitmaps
II. create hole for ttf
2. No PAGE_NOACCESS interaction to care about
3. No crash anymore
4. More complicated when randomization in place, but .. doable ..
http://www.slideshare.net/PeterHlavaty/overflow-48573748
write (overflow) – what ? ... N O !
 follow right path at right
moment
 control output of math
operation - to some extent
going to be complicated ?
You need to
go trough some
math, semi -
controlled write-what
meet some
conditions to write-
semi-what
control kernel
memory
*must* to use
_gre_bitmap header
member!
By Design #2 [ SMAP betrayal ]
Controlled data in kernel, bitmap is just an example! Look more, you will find more …
https://msdn.microsoft.com
win32k!
_GRE_BITMAP
Session Pool
kmalloc – CreateBitmap
kfree – DeleteObject
Controlled – {Set/Get}BitmapBits
Known-PLAIN-state header!
By Design #3 [ plain state, ptr ?! ]
*PLAIN*
header
&buffer
size&lock
feature 1 : user data : kernel data == 1:1
◦ by design #2
feature 2 : *plain* headers [ in general ]
◦ Properties : size, width, height, …
◦ Pointer to buffers
◦ Pointer to function or ‘vtable’
◦ Pointer to another member struct : lock, …
Consequences :
◦ From user mode I know content of header (size, ..)
◦ I can guess content of header (pointers – base, gran)
◦ I can manipulate it if I have tool to do it [our case]
◦ I can use it when it is necessary [our case]
http://www.slideshare.net/PeterHlavaty/attack-on-the-core
Stage #1 [ overflow ]
 What we do :
 Math-calc based overflow
 In right conditions is something
somehow rewritten
 We can rewrite size
 But then we also rewrite Lock
 What we get :
 size is bigger (but still small!)
 Lock - DWORD part is corrupted!
Stage #2 [ full kernel IO ]
* Sometimes getting more tricky
due to more complicated overflow
in our case we need 3 bitmaps
idea is similar ...
 What we do :
 spray, &Lock ptr points to
accessible memory
 SetBitmapBits to boost followed
bitmap size to ~0
 What we get* :
 FULL KERNEL IO
 {Set/Get}BitmapBits at the
second bitmap
wrap up
Wild
overflow
semi-control
overflowing
bytes
Kernel
memory
(part of it)
control
Bug under
control
Full kernel
IO achieved
what now ?
Era of security features ? X64, KASLR, NX, SMAP, SMEP, CFI ?!
Kernel security …
X64 – virtual address space
KASLR – modules
NX – ExAllocatePool nonexec by default
SMEP – no easy exec anymore +-
SMAP – hopefully SOON
CFI – by control flow guard implementation, hopefully SOON
http://www.slideshare.net/PeterHlavaty/guardians-ofyourcode
KASLR
 Randomization of module
addresses
 Randomization of pool addresses
 When you do not know where
your target is then is hard to attack
By Design #4 [ full kernel IO ]
Touching invalid memory ?
[ x64 VAS > PAS ]
Kernel memory layout ?
[ KASLR ]
Leak pointer chain to valid module :
◦ Info-leak bug
◦ _sidt / _sgdt
Turn your bug to pool overflow
◦ misuse object on the pool
* Or use old know technique *
Echo from the past [ wtf ?! ]
 _sidt & _sgdt from wow64 does not leak
 I was lazy to invent new method for second TTF
 Wait, hmm, there was something years ago ..
 I was sure it is fixed already, but worth to check
 Leaking Session Pool objects, problem bro ?
https://media.blackhat.com/bh-us-11/Mandt/BH_US_11_Mandt_win32k_Slides.pdf
gSharedInfo
Echo from the past [ implementation ]
Are we done ?
> Yeah, poping system calcs … but we want kernel EXEC!
Design (#3) strikes back [ plain ptr ]
some good function pointers at windows kernel are free to overwrite!
◦ we skip some good candidates like HalDispatchTable to pinpoint some different …
SMEP
 X86_CR4_SMEP
 Execute user mode code with
kernel mode privileges results in
BSOD
 Previously heavily used as
exploitation shortcut
‘SMAP’
 X86_CR4_SMAP
 In syscall user pass arguments as
well
 Those arguments have to be
readed
 No unified method for read /
write those inputs is problem for
enabling SMAP
NonExec
 Code is special case of data
 If creating data with EXEC
 any data shipped from user mode
to kernel can be executed
 Unless NonPagedPoolNx
take place at ExAllocatePool
SMAP -> SMEP ?
 { ‘by design #2’ + ‘echo’ / overflow } bypass SMAP
 Page Tables to bypass NonExec & SMEP ?
 Lets say some additional protection
 HyperVisor solution – EPT, TrustZone , …
Page Table attack
VadPwn &
PageTablePwn boost
https://labs.mwrinfosecurity.com/blog/2014/08/15/
windows-8-kernel-memory-protections-bypass/
http://www.slideshare.net/PeterHlavaty/back-to-the-core
Insection:
AWEsome ...
http://www.alex-ionescu.com/?cat=2 - intro
ExAllocatePool
We need to get RWE memory
OK, lets allocate it!
* remember we have kernel IO !!
Flags problem, it must be RWE memory !
Address problem, how to leak it back to user ?
Window tricking [ that’s a cheat! ]
There we go, some magic function again
Working with window handles
writeable ‘vtable’
‘Unused’ function pointers there
Returning output back to user
Lets mess little bit with logic!
provide window pointer as ExAllocatePool flags ?
Ensure that window pointer can act as writable & executable flag ;)
WINDOW
handle (user argument)
WINDOW
pointer (kernel argument)
output returned to user
that must be nasty …
http://www.slideshare.net/PeterHlavaty/vulnerability-desing-patterns
Control Flow
Guard
 Indirect calls check
 in kernel mode not so widely used
yet, hopefully will be … soon …
 bitmap & registered functions
Control Flow Guard [ FDA ]
 It covers old way of thinking
 Good for mitigating ROP to some extent
 CFG-bitmap does not care about integrity of objects
 Function-Driven-Attack prone
 FDA is more complicated than ROP but nice way
 You will searching for vfgadgets instead of rop-gadgets
 realize that for now we used function driven attack only (exallocatepool + window tricking) !
http://syssec.rub.de/media/emma/veroeffentlichungen/2015/04/13/COOP-Oakland15_1.pdf http://www.slideshare.net/PeterHlavaty/back-to-the-core
By Design #4 [ CF stack please ]
http://www.slideshare.net/PeterHlavaty/back-to-the-core
 We have just one stack
 Data & Control Flow mixed
 any RW instruction can touch stack
… what CFI we are talking about ? …
Stack hooking
Get address of
stack of your
kernel thread
Use write-where-
what primitive
(kernel IO) to it
Just now, you did
stack hooking of
you own stack
CFI bypassed by
design!
kernelIO.Write(own_stack, own_driver_ep)
Windows Kernel Exploitation : This Time Font hunt you down in 4 bytes
poping calcs #2 – d’art
btw. Did you spot something ?
1bit-flip to kernel pwn ?
Any problem here ? [ aftermath ]
pwn2own – recon => XX - days
we found it in 3weeks – for *security* and fun
Other guys spending much more time at TTF, most likely not for fun nor for security
After we got bug under control, we spent 1-2days with executing it
Additional few days with design - d’art 
Exploitation technique ? Nope, it is package of design features.. OS design is bit old ?
Known security issues persist *PUBLIC* for 4+ years
https://securelist.com/files/2015/06/The_Mystery_of_Duqu_2_0_a_sophisticated_cyberespionage_actor_returns.pdf - as a recent example ?
10.24.2015
Pick a device, name your own challenge!
INTERNS WANTED! WE ARE HIRING! :)
@K33nTeam
hr (at) keencloudtech.com
Q & A

More Related Content

What's hot (20)

PDF
MacOS memory allocator (libmalloc) Exploitation
Angel Boy
 
PPTX
ret2dl resolve
sounakano
 
PDF
Heap exploitation
Angel Boy
 
PDF
WSL Reloaded
Anthony LAOU-HINE TSUEI
 
PDF
Pwning in c++ (basic)
Angel Boy
 
PDF
Exploiting Deserialization Vulnerabilities in Java
CODE WHITE GmbH
 
PDF
Windows 10 Nt Heap Exploitation (Chinese version)
Angel Boy
 
PDF
Kdump and the kernel crash dump analysis
Buland Singh
 
PPTX
Maven
Emprovise
 
PDF
oVirt installation guide_v4.3
CheolHee Han
 
PDF
An Overview of Deserialization Vulnerabilities in the Java Virtual Machine (J...
joaomatosf_
 
PDF
Boosting I/O Performance with KVM io_uring
ShapeBlue
 
PDF
CSW2017 Qinghao tang+Xinlei ying vmware_escape_final
CanSecWest
 
PPTX
Injection on Steroids: Codeless code injection and 0-day techniques
enSilo
 
PDF
What’s wrong with WebSocket APIs? Unveiling vulnerabilities in WebSocket APIs.
Mikhail Egorov
 
PDF
qemu + gdb: The efficient way to understand/debug Linux kernel code/data stru...
Adrian Huang
 
PPTX
Slab Allocator in Linux Kernel
Adrian Huang
 
PPTX
Docker Networking
Kingston Smiler
 
PDF
[232] 성능어디까지쥐어짜봤니 송태웅
NAVER D2
 
PDF
MySQL Space Management
MIJIN AN
 
MacOS memory allocator (libmalloc) Exploitation
Angel Boy
 
ret2dl resolve
sounakano
 
Heap exploitation
Angel Boy
 
Pwning in c++ (basic)
Angel Boy
 
Exploiting Deserialization Vulnerabilities in Java
CODE WHITE GmbH
 
Windows 10 Nt Heap Exploitation (Chinese version)
Angel Boy
 
Kdump and the kernel crash dump analysis
Buland Singh
 
Maven
Emprovise
 
oVirt installation guide_v4.3
CheolHee Han
 
An Overview of Deserialization Vulnerabilities in the Java Virtual Machine (J...
joaomatosf_
 
Boosting I/O Performance with KVM io_uring
ShapeBlue
 
CSW2017 Qinghao tang+Xinlei ying vmware_escape_final
CanSecWest
 
Injection on Steroids: Codeless code injection and 0-day techniques
enSilo
 
What’s wrong with WebSocket APIs? Unveiling vulnerabilities in WebSocket APIs.
Mikhail Egorov
 
qemu + gdb: The efficient way to understand/debug Linux kernel code/data stru...
Adrian Huang
 
Slab Allocator in Linux Kernel
Adrian Huang
 
Docker Networking
Kingston Smiler
 
[232] 성능어디까지쥐어짜봤니 송태웅
NAVER D2
 
MySQL Space Management
MIJIN AN
 

Viewers also liked (20)

PDF
Expanding the control over the operating system from the database
Bernardo Damele A. G.
 
PDF
ORM Injection
Simone Onofri
 
PDF
Object Oriented Exploitation: New techniques in Windows mitigation bypass
Sam Thomas
 
PDF
ORM2Pwn: Exploiting injections in Hibernate ORM
Mikhail Egorov
 
PPTX
Invoke-Obfuscation nullcon 2017
Daniel Bohannon
 
PPTX
Attack on the Core
Peter Hlavaty
 
PDF
Final lfh presentation (3)
__x86
 
PPTX
Back to the CORE
Peter Hlavaty
 
PDF
Find your own iOS kernel bug
Gustavo Martinez
 
PDF
When is something overflowing
Peter Hlavaty
 
PDF
How to-catch-a-chameleon-steven seeley-ruxcon-2012
_mr_me
 
PDF
D2 t2 steven seeley - ghost in the windows 7 allocator
_mr_me
 
PPTX
How Safe is your Link ?
Peter Hlavaty
 
PDF
Rainbow Over the Windows: More Colors Than You Could Expect
Peter Hlavaty
 
PDF
CSW2017 Weston miller csw17_mitigating_native_remote_code_execution
CanSecWest
 
PDF
Deobfuscation and beyond (ZeroNights, 2014)
ReCrypt
 
PDF
AntiVirus Evasion Reconstructed - Veil 3.0
CTruncer
 
PDF
CSW2017 Henry li how to find the vulnerability to bypass the control flow gua...
CanSecWest
 
PDF
NDIS Packet of Death
nitayart
 
PDF
Av power consumption trial executive summary v1 0
Anatol Alizar
 
Expanding the control over the operating system from the database
Bernardo Damele A. G.
 
ORM Injection
Simone Onofri
 
Object Oriented Exploitation: New techniques in Windows mitigation bypass
Sam Thomas
 
ORM2Pwn: Exploiting injections in Hibernate ORM
Mikhail Egorov
 
Invoke-Obfuscation nullcon 2017
Daniel Bohannon
 
Attack on the Core
Peter Hlavaty
 
Final lfh presentation (3)
__x86
 
Back to the CORE
Peter Hlavaty
 
Find your own iOS kernel bug
Gustavo Martinez
 
When is something overflowing
Peter Hlavaty
 
How to-catch-a-chameleon-steven seeley-ruxcon-2012
_mr_me
 
D2 t2 steven seeley - ghost in the windows 7 allocator
_mr_me
 
How Safe is your Link ?
Peter Hlavaty
 
Rainbow Over the Windows: More Colors Than You Could Expect
Peter Hlavaty
 
CSW2017 Weston miller csw17_mitigating_native_remote_code_execution
CanSecWest
 
Deobfuscation and beyond (ZeroNights, 2014)
ReCrypt
 
AntiVirus Evasion Reconstructed - Veil 3.0
CTruncer
 
CSW2017 Henry li how to find the vulnerability to bypass the control flow gua...
CanSecWest
 
NDIS Packet of Death
nitayart
 
Av power consumption trial executive summary v1 0
Anatol Alizar
 
Ad

Similar to Windows Kernel Exploitation : This Time Font hunt you down in 4 bytes (20)

PDF
NSC #2 - D3 02 - Peter Hlavaty - Attack on the Core
NoSuchCon
 
PPTX
Guardians of your CODE
Peter Hlavaty
 
PPTX
Metasploit & Windows Kernel Exploitation
zeroSteiner
 
PDF
Hunting and Exploiting Bugs in Kernel Drivers - DefCamp 2012
DefCamp
 
PDF
Jaime Peñalba - Kernel exploitation. ¿El octavo arte? [rooted2019]
RootedCON
 
PPTX
Power of linked list
Peter Hlavaty
 
PDF
Csw2016 economou nissim-getting_physical
CanSecWest
 
PDF
CONFidence 2015: when something overflowing... - Peter Hlavaty
PROIDEA
 
PPTX
Security research over Windows #defcon china
Peter Hlavaty
 
PPT
Joanna Rutkowska Subverting Vista Kernel
guestf1a032
 
PDF
Bh us 12_cerrudo_windows_kernel_wp
Le Sy Duy Hiep
 
PPTX
Ice Age melting down: Intel features considered usefull!
Peter Hlavaty
 
PDF
various tricks for remote linux exploits  by Seok-Ha Lee (wh1ant)
CODE BLUE
 
PPTX
Page table manipulation attack
Jungseung Lee 이정승
 
PDF
Recon2013 alex ionescu-i got 99 problems but a kernel pointer ain't one
Artem I. Baranov
 
PDF
Smashing the Buffer
Miroslav Stampar
 
PDF
Racing the Dark: A New TOCTTOU Story from Apple's Core
4ynkx9www2
 
PDF
Oleksyk applied-anti-forensics
DefconRussia
 
PDF
CNIT 127 14: Protection Mechanisms
Sam Bowne
 
PDF
Semtex.c [CVE-2013-2094] - A Linux Privelege Escalation
Kernel TLV
 
NSC #2 - D3 02 - Peter Hlavaty - Attack on the Core
NoSuchCon
 
Guardians of your CODE
Peter Hlavaty
 
Metasploit & Windows Kernel Exploitation
zeroSteiner
 
Hunting and Exploiting Bugs in Kernel Drivers - DefCamp 2012
DefCamp
 
Jaime Peñalba - Kernel exploitation. ¿El octavo arte? [rooted2019]
RootedCON
 
Power of linked list
Peter Hlavaty
 
Csw2016 economou nissim-getting_physical
CanSecWest
 
CONFidence 2015: when something overflowing... - Peter Hlavaty
PROIDEA
 
Security research over Windows #defcon china
Peter Hlavaty
 
Joanna Rutkowska Subverting Vista Kernel
guestf1a032
 
Bh us 12_cerrudo_windows_kernel_wp
Le Sy Duy Hiep
 
Ice Age melting down: Intel features considered usefull!
Peter Hlavaty
 
various tricks for remote linux exploits  by Seok-Ha Lee (wh1ant)
CODE BLUE
 
Page table manipulation attack
Jungseung Lee 이정승
 
Recon2013 alex ionescu-i got 99 problems but a kernel pointer ain't one
Artem I. Baranov
 
Smashing the Buffer
Miroslav Stampar
 
Racing the Dark: A New TOCTTOU Story from Apple's Core
4ynkx9www2
 
Oleksyk applied-anti-forensics
DefconRussia
 
CNIT 127 14: Protection Mechanisms
Sam Bowne
 
Semtex.c [CVE-2013-2094] - A Linux Privelege Escalation
Kernel TLV
 
Ad

Recently uploaded (17)

PDF
The Impact of Game Live Streaming on In-Game Purchases of Chinese Young Game ...
Shibaura Institute of Technology
 
PPTX
Inspired by VeinSense: Supercharge Your Hackathon with Agentic AI
ShubhamSharma2528
 
PPTX
2025-07-06 Abraham 06 (shared slides).pptx
Dale Wells
 
PDF
From Draft to DSN - How to Get your Paper In [DSN 2025 Doctoral Forum Keynote]
vschiavoni
 
PPTX
AI presentation for everyone in every fields
dodinhkhai1
 
PPTX
Great-Books. Powerpoint presentation. files
tamayocrisgie
 
PDF
Leveraging the Power of Jira Dashboard.pdf
siddharthshukla742740
 
PDF
Buy Verified Coinbase Accounts — The Ultimate Guide for 2025 (Rank #1 on Goog...
Buy Verified Cash App Accounts
 
PPTX
STURGEON BAY WI AG PPT JULY 6 2025.pptx
FamilyWorshipCenterD
 
PPTX
BARRIERS TO EFFECTIVE COMMUNICATION.pptx
shraddham25
 
PPTX
some leadership theories MBA management.pptx
rkseo19
 
PDF
Buy Verified Payoneer Accounts — The Ultimate Guide for 2025 (Rank #1 on Goog...
Buy Verified Cash App Accounts
 
PDF
The Origin - A Simple Presentation on any project
RishabhDwivedi43
 
PPTX
Pastor Bob Stewart Acts 21 07 09 2025.pptx
FamilyWorshipCenterD
 
PDF
The Family Secret (essence of loveliness)
Favour Biodun
 
PPTX
presentation on legal and regulatory action
raoharsh4122001
 
PPTX
Presentationexpressions You are student leader and have just come from a stud...
BENSTARBEATZ
 
The Impact of Game Live Streaming on In-Game Purchases of Chinese Young Game ...
Shibaura Institute of Technology
 
Inspired by VeinSense: Supercharge Your Hackathon with Agentic AI
ShubhamSharma2528
 
2025-07-06 Abraham 06 (shared slides).pptx
Dale Wells
 
From Draft to DSN - How to Get your Paper In [DSN 2025 Doctoral Forum Keynote]
vschiavoni
 
AI presentation for everyone in every fields
dodinhkhai1
 
Great-Books. Powerpoint presentation. files
tamayocrisgie
 
Leveraging the Power of Jira Dashboard.pdf
siddharthshukla742740
 
Buy Verified Coinbase Accounts — The Ultimate Guide for 2025 (Rank #1 on Goog...
Buy Verified Cash App Accounts
 
STURGEON BAY WI AG PPT JULY 6 2025.pptx
FamilyWorshipCenterD
 
BARRIERS TO EFFECTIVE COMMUNICATION.pptx
shraddham25
 
some leadership theories MBA management.pptx
rkseo19
 
Buy Verified Payoneer Accounts — The Ultimate Guide for 2025 (Rank #1 on Goog...
Buy Verified Cash App Accounts
 
The Origin - A Simple Presentation on any project
RishabhDwivedi43
 
Pastor Bob Stewart Acts 21 07 09 2025.pptx
FamilyWorshipCenterD
 
The Family Secret (essence of loveliness)
Favour Biodun
 
presentation on legal and regulatory action
raoharsh4122001
 
Presentationexpressions You are student leader and have just come from a stud...
BENSTARBEATZ
 

Windows Kernel Exploitation : This Time Font hunt you down in 4 bytes

  • 1. FROM KERNEL ESCAPE TO SYSTEM CALC This Time Font hunt you down in 4 bytes! @zer0mem@promised_lu
  • 2. 一步一步 TTF  what ?  Pinging TTF  Different  start to play  wild overflow TECHNIQUE  data to kernel  bitmap wants to help!  bit of math instead write-what  ruling of bitmap!  x64, KASLR, NX, SMEP, SMAP, CFG  echo from the past  have we problems, security ?
  • 3. #whoarewe [ KEEN TEAM ]  We are doing sec research  We like challenges & security  pwn2own 2013 / 2014 / 2015  actively contributing to geek community  working with project zero  cve / techs / blog / tools / codes / conferences  GeekPwn organizer  #shanghai #beijing
  • 4. Practical Example NoSuchCon : http://www.slideshare.net/PeterHlavaty/ attack-on-the-core SyScan : http://www.slideshare.net/PeterHlavaty/ back-to-the-core http://www.nosuchcon.org/ https://syscan.org/ https://www.syscan360.org/ we were talking before of some issues in kernel … … this time we will show it in practice
  • 5. TTF, what is that ? TRUE TYPE FORMAT TrueType is an outline font standard developed by Apple and Microsoft in the late 1980s as a competitor to Adobe's Type 1 fonts used in PostScript. It has become the most common format for fonts on both the Mac OS and Microsoft Windows operating systems. The primary strength of TrueType was originally that it offered font developers a high degree of control over precisely how their fonts are displayed, right down to particular pixels, at various font sizes. With widely varying rendering technologies in use today, pixel-level control is no longer certain in a TrueType font. … THIS TOOL (IS) FABULOUS Offers VM, where in certain conditions you can with your controlled VM instructions achieve : ◦ READ ◦ WRITE In certain scenario it offers boosting surrounding structures in the same pool, what can leads to : ◦ READ ◦ WRITE + some other offering in certain conditions
  • 6. Ok that was .. lazy [ background ] Nice internals in attackers perspective : https://cansecwest.com/slides/2013/Analysis%20of%20a%20Windows%20Kernel%20Vuln.pdf Fuzzing fonts, structure info .. : https://digteam.github.io/assets/tocttou.pdf https://media.blackhat.com/us-13/US-13-Chan-Smashing-The-Font-Scaler-Engine-in-Windows- Kernel-Slides.pdf
  • 7. Pinging TTF January meeting about pwn2own February decided we will go after our TTF bugs March pwn2own, 2 kernel escapes to system calcs  building novel TTF fuzzer (@promised_lu)  let fuzzer run for 3 weeks  3 *exploitable* bugs discovered at that period  3-4 weeks for 2 kernel escapes by TTF  more bugs discovered waiting for review now
  • 8. This time bit different TTF from the past  Bug to modify state of virtual machine  Using VM instructions to pwn kernel this TTF  Bug in building state of VM  Sequence of instruction (4b) to trigger bug  No more control from VM :
  • 9. Shall we play a game ?
  • 10. #tools & #materials You will need to parse TTF : TTX You will need to understand format to build your own parser / update-er : View it in human quick & understandable way : FarManager / ConEmu & plugins https://pypi.python.org/pypi/FontTools & https://github.com/behdad/fonttools/ http://www.farmanager.com/ https://twitter.com/ConEmuMaximus5 http://www.microsoft.com/typography/otspec/otff.htm
  • 11. Minimize your problem! 1. As you got crash, problem can be everywhere 2. Build parsing tools (or use existing ones) 3. Kick all part what is not necessary from TTF out 4. Start working on minimalized TTF https://media.blackhat.com/us-13/US-13-Chan-Smashing-The-Font-Scaler-Engine-in-Windows-Kernel-Slides.pdf
  • 12. gotcha! Wild Overflow  finally we got root cause!  Only XX pages to be overflowing in  need to alter XX pages in kernel pool without crash ?! No interaction from VM is possible anymore
  • 14. x64  got overflow  Must control data after  x64 introduce a lot of gaps  Spraying as was used before is ineffective  But …  …not in the same pool http://www.alex-ionescu.com/?p=246
  • 15. Look at your pool Conditional breakpoint command on ExAllocatePool-0x21 on big allocs & results controlled size & at byte level
  • 16. Big Pools RANDOMIZATION  Not at big pools  Making controlled holes at will  Precise pool layout SPRAYING  still highly effective inside targeted pool  if you know base of pool, you can hardcode  kmalloc & kfree at your will wild overflow is no problem anymore!
  • 17. By Design #1 [ overflows ] 1. Do pool layout I. spray bitmaps II. create hole for ttf 2. No PAGE_NOACCESS interaction to care about 3. No crash anymore 4. More complicated when randomization in place, but .. doable .. http://www.slideshare.net/PeterHlavaty/overflow-48573748
  • 18. write (overflow) – what ? ... N O !  follow right path at right moment  control output of math operation - to some extent
  • 19. going to be complicated ? You need to go trough some math, semi - controlled write-what meet some conditions to write- semi-what control kernel memory *must* to use _gre_bitmap header member!
  • 20. By Design #2 [ SMAP betrayal ] Controlled data in kernel, bitmap is just an example! Look more, you will find more … https://msdn.microsoft.com
  • 21. win32k! _GRE_BITMAP Session Pool kmalloc – CreateBitmap kfree – DeleteObject Controlled – {Set/Get}BitmapBits Known-PLAIN-state header!
  • 22. By Design #3 [ plain state, ptr ?! ] *PLAIN* header &buffer size&lock feature 1 : user data : kernel data == 1:1 ◦ by design #2 feature 2 : *plain* headers [ in general ] ◦ Properties : size, width, height, … ◦ Pointer to buffers ◦ Pointer to function or ‘vtable’ ◦ Pointer to another member struct : lock, … Consequences : ◦ From user mode I know content of header (size, ..) ◦ I can guess content of header (pointers – base, gran) ◦ I can manipulate it if I have tool to do it [our case] ◦ I can use it when it is necessary [our case] http://www.slideshare.net/PeterHlavaty/attack-on-the-core
  • 23. Stage #1 [ overflow ]  What we do :  Math-calc based overflow  In right conditions is something somehow rewritten  We can rewrite size  But then we also rewrite Lock  What we get :  size is bigger (but still small!)  Lock - DWORD part is corrupted!
  • 24. Stage #2 [ full kernel IO ] * Sometimes getting more tricky due to more complicated overflow in our case we need 3 bitmaps idea is similar ...  What we do :  spray, &Lock ptr points to accessible memory  SetBitmapBits to boost followed bitmap size to ~0  What we get* :  FULL KERNEL IO  {Set/Get}BitmapBits at the second bitmap
  • 25. wrap up Wild overflow semi-control overflowing bytes Kernel memory (part of it) control Bug under control Full kernel IO achieved
  • 26. what now ? Era of security features ? X64, KASLR, NX, SMAP, SMEP, CFI ?!
  • 27. Kernel security … X64 – virtual address space KASLR – modules NX – ExAllocatePool nonexec by default SMEP – no easy exec anymore +- SMAP – hopefully SOON CFI – by control flow guard implementation, hopefully SOON http://www.slideshare.net/PeterHlavaty/guardians-ofyourcode
  • 28. KASLR  Randomization of module addresses  Randomization of pool addresses  When you do not know where your target is then is hard to attack
  • 29. By Design #4 [ full kernel IO ] Touching invalid memory ? [ x64 VAS > PAS ] Kernel memory layout ? [ KASLR ] Leak pointer chain to valid module : ◦ Info-leak bug ◦ _sidt / _sgdt Turn your bug to pool overflow ◦ misuse object on the pool * Or use old know technique *
  • 30. Echo from the past [ wtf ?! ]  _sidt & _sgdt from wow64 does not leak  I was lazy to invent new method for second TTF  Wait, hmm, there was something years ago ..  I was sure it is fixed already, but worth to check  Leaking Session Pool objects, problem bro ? https://media.blackhat.com/bh-us-11/Mandt/BH_US_11_Mandt_win32k_Slides.pdf gSharedInfo
  • 31. Echo from the past [ implementation ]
  • 32. Are we done ? > Yeah, poping system calcs … but we want kernel EXEC!
  • 33. Design (#3) strikes back [ plain ptr ] some good function pointers at windows kernel are free to overwrite! ◦ we skip some good candidates like HalDispatchTable to pinpoint some different …
  • 34. SMEP  X86_CR4_SMEP  Execute user mode code with kernel mode privileges results in BSOD  Previously heavily used as exploitation shortcut
  • 35. ‘SMAP’  X86_CR4_SMAP  In syscall user pass arguments as well  Those arguments have to be readed  No unified method for read / write those inputs is problem for enabling SMAP
  • 36. NonExec  Code is special case of data  If creating data with EXEC  any data shipped from user mode to kernel can be executed  Unless NonPagedPoolNx take place at ExAllocatePool
  • 37. SMAP -> SMEP ?  { ‘by design #2’ + ‘echo’ / overflow } bypass SMAP  Page Tables to bypass NonExec & SMEP ?  Lets say some additional protection  HyperVisor solution – EPT, TrustZone , … Page Table attack VadPwn & PageTablePwn boost https://labs.mwrinfosecurity.com/blog/2014/08/15/ windows-8-kernel-memory-protections-bypass/ http://www.slideshare.net/PeterHlavaty/back-to-the-core Insection: AWEsome ... http://www.alex-ionescu.com/?cat=2 - intro
  • 38. ExAllocatePool We need to get RWE memory OK, lets allocate it! * remember we have kernel IO !! Flags problem, it must be RWE memory ! Address problem, how to leak it back to user ?
  • 39. Window tricking [ that’s a cheat! ] There we go, some magic function again Working with window handles writeable ‘vtable’ ‘Unused’ function pointers there Returning output back to user Lets mess little bit with logic! provide window pointer as ExAllocatePool flags ? Ensure that window pointer can act as writable & executable flag ;) WINDOW handle (user argument) WINDOW pointer (kernel argument) output returned to user
  • 40. that must be nasty … http://www.slideshare.net/PeterHlavaty/vulnerability-desing-patterns
  • 41. Control Flow Guard  Indirect calls check  in kernel mode not so widely used yet, hopefully will be … soon …  bitmap & registered functions
  • 42. Control Flow Guard [ FDA ]  It covers old way of thinking  Good for mitigating ROP to some extent  CFG-bitmap does not care about integrity of objects  Function-Driven-Attack prone  FDA is more complicated than ROP but nice way  You will searching for vfgadgets instead of rop-gadgets  realize that for now we used function driven attack only (exallocatepool + window tricking) ! http://syssec.rub.de/media/emma/veroeffentlichungen/2015/04/13/COOP-Oakland15_1.pdf http://www.slideshare.net/PeterHlavaty/back-to-the-core
  • 43. By Design #4 [ CF stack please ] http://www.slideshare.net/PeterHlavaty/back-to-the-core  We have just one stack  Data & Control Flow mixed  any RW instruction can touch stack … what CFI we are talking about ? …
  • 44. Stack hooking Get address of stack of your kernel thread Use write-where- what primitive (kernel IO) to it Just now, you did stack hooking of you own stack CFI bypassed by design! kernelIO.Write(own_stack, own_driver_ep)
  • 46. poping calcs #2 – d’art
  • 47. btw. Did you spot something ? 1bit-flip to kernel pwn ?
  • 48. Any problem here ? [ aftermath ] pwn2own – recon => XX - days we found it in 3weeks – for *security* and fun Other guys spending much more time at TTF, most likely not for fun nor for security After we got bug under control, we spent 1-2days with executing it Additional few days with design - d’art  Exploitation technique ? Nope, it is package of design features.. OS design is bit old ? Known security issues persist *PUBLIC* for 4+ years https://securelist.com/files/2015/06/The_Mystery_of_Duqu_2_0_a_sophisticated_cyberespionage_actor_returns.pdf - as a recent example ?
  • 49. 10.24.2015 Pick a device, name your own challenge!
  • 50. INTERNS WANTED! WE ARE HIRING! :) @K33nTeam hr (at) keencloudtech.com Q & A