Published on December 29th, 2015 📆 | 6618 Views ⚑0
Social Engineering The Windows Kernel: Finding And Exploiting Token Handling Vulnerabilities
by James Forshaw
One successful technique in social engineering is pretending to be someone or something you’re not and hoping the security guard who’s forgotten their reading glasses doesn’t look too closely at your fake ID. Of course there’s no hyperopic guard in the Windows OS, but we do have an ID card, the Access Token which proves our identity to the system and let’s us access secured resources. The Windows kernel provides simple capabilities to identify fake Access Tokens, but sometimes the kernel or other kernel-mode drivers are too busy to use them correctly. If a fake token isn’t spotted during a privileged operation local elevation of privilege or information disclosure vulnerabilities can be the result. This could allow an attacker to break out of an application sandbox, elevate to administrator privileges, or even compromise the kernel itself. This presentation is about finding and then exploiting the incorrect handling of tokens in the Windows kernel as well as first and third party drivers. Examples of serious vulnerabilities, such as CVE-2015-0002 and CVE-2015-0062 will be presented. It will provide clear exploitable patterns so that you can do your own security reviews for these issues. Finally, I’ll discuss some of the ways of exploiting these types of vulnerabilities to elevate local privileges.