SlideShare a Scribd company logo
1 of 76
Thinking in rings
Michael Shalyt
Malware Research Team Leader @ Check Point
PRIVILEGE ESCALATION
MICHAEL SHALYT – BIO-IN-A-GRAPH
Technology
Research
MICHAEL SHALYT – BIO-IN-A-GRAPH
Technology
Research
First program (8yo)
MICHAEL SHALYT – BIO-IN-A-GRAPH
Technology
Research
First program (8yo)
ASM (13yo)
MICHAEL SHALYT – BIO-IN-A-GRAPH
Technology
Research
First program (8yo)
ASM (13yo)
IPHO 2005
MICHAEL SHALYT – BIO-IN-A-GRAPH
Technology
Research
First program (8yo)
ASM (13yo)
IPHO 2005
BSc. Physics + EE
MICHAEL SHALYT – BIO-IN-A-GRAPH
Technology
Research
First program (8yo)
ASM (13yo)
Cyber Cyber
IPHO 2005
BSc. Physics + EE
MICHAEL SHALYT – BIO-IN-A-GRAPH
Technology
Research
First program (8yo)
ASM (13yo)
Cyber Cyber
Reverse Engineering
IPHO 2005
BSc. Physics + EE
MICHAEL SHALYT – BIO-IN-A-GRAPH
Technology
Research
First program (8yo)
ASM (13yo)
Cyber Cyber
Reverse Engineering
Research TL
IPHO 2005
BSc. Physics + EE
MICHAEL SHALYT – BIO-IN-A-GRAPH
Technology
Research
First program (8yo)
ASM (13yo)
Cyber Cyber
Reverse Engineering
Research TL
IPHO 2005
BSc. Physics + EE
MSc. Quantum Information
MICHAEL SHALYT – BIO-IN-A-GRAPH
Technology
Research
First program (8yo)
ASM (13yo)
Cyber Cyber
Reverse Engineering
Research TL
IPHO 2005
BSc. Physics + EE
MSc. Quantum Information
Malware Research TL @CP
MICHAEL SHALYT – BIO-IN-A-GRAPH
Technology
Research
First program (8yo)
ASM (13yo)
Matlab
Javascript
Actionscript
Mathematica
C
Scheme
Cyber Cyber
Reverse Engineering
Research TL
Python
IPHO 2005
BSc. Physics + EE
MSc. Quantum Information
Malware Research TL @CP
Pascal
AutoIT
MICHAEL SHALYT – BIO-IN-A-GRAPH
Technology
Research
First program (8yo)
Lifeinagraph.blogspot.com
ASM (13yo)
Matlab
Javascript
Actionscript
Mathematica
C
Scheme
Cyber Cyber
Reverse Engineering
Research TL
Python
IPHO 2005
BSc. Physics + EE
MSc. Quantum Information
Malware Research TL @CP
Pascal
AutoIT
Catapults
Humans
WHAT’S A HACKER?
WHAT’S A HACKER?
• People committed to circumvention of computer
security.
WHAT’S A HACKER?
• People committed to circumvention of computer
security.
• RFC 1392: “A person who delights in having an
intimate understanding of the internal workings of a
system”. (1960s around MIT's Tech Model Railroad
Club)
WHAT’S A HACKER?
• People committed to circumvention of computer
security.
• RFC 1392: “A person who delights in having an
intimate understanding of the internal workings of a
system”. (1960s around MIT's Tech Model Railroad
Club)
• Vs. “user” (like “script kiddies”)
PRIVILEGE
PRIVILEGE
RINGS AND GATEKEEPERS
RINGS AND GATEKEEPERS
RINGS AND GATEKEEPERS
PRINCIPAL OF LEAST PRIVILEGE
PRINCIPAL OF LEAST PRIVILEGE
• System stability.
PRINCIPAL OF LEAST PRIVILEGE
• System stability.
• Security.
PRINCIPAL OF LEAST PRIVILEGE
• System stability.
• Security.
• Ease of deployment.
PRINCIPAL OF LEAST PRIVILEGE
• System stability.
• Security.
• Ease of deployment.
• In RL: Compartmentalization / Encapsulation.
X86 RINGS
Most privileged
Least privileged
VERTICAL PE - WHAT
VERTICAL PE - WHAT
• User -> admin.
VERTICAL PE - WHAT
• User -> admin.
• User -> system/root.
VERTICAL PE - WHAT
• User -> admin.
• User -> system/root.
• Javascript -> shellcode.
VERTICAL PE - WHAT
• User -> admin.
• User -> system/root.
• Javascript -> shellcode.
• Username -> access.
VERTICAL PE - WHAT
• User -> admin.
• User -> system/root.
• Javascript -> shellcode.
• Username -> access.
• Hypervisor instance traversal.
VERTICAL PE - WHAT
• User -> admin.
• User -> system/root.
• Javascript -> shellcode.
• Username -> access.
• Hypervisor instance traversal.
• Access to restricted places/documents/data.
VERTICAL PE - WHAT
• User -> admin.
• User -> system/root.
• Javascript -> shellcode.
• Username -> access.
• Hypervisor instance traversal.
• Access to restricted places/documents/data.
• Etc.
HORIZONTAL PE - WHAT
HORIZONTAL PE - WHAT
• User impersonation (bank app credentials).
HORIZONTAL PE - WHAT
• User impersonation (bank app credentials).
• User data theft (credit card).
HORIZONTAL PE - WHAT
• User impersonation (bank app credentials).
• User data theft (credit card).
• Hypervisor instance spying.
HORIZONTAL PE - WHAT
• User impersonation (bank app credentials).
• User data theft (credit card).
• Hypervisor instance spying.
• Framing someone else.
HORIZONTAL PE - WHAT
• User impersonation (bank app credentials).
• User data theft (credit card).
• Hypervisor instance spying.
• Framing someone else.
• Etc.
PE – BATTLE PLAN
PE – BATTLE PLAN
• You already have limited capabilities.
PE – BATTLE PLAN
• You already have limited capabilities.
• Use them to:
• Gather info (profiling).
PE – BATTLE PLAN
• You already have limited capabilities.
• Use them to:
• Gather info (profiling).
• Pass through the guard mechanism (appear as
legitimate low ring-high ring interaction).
PE – BATTLE PLAN
• You already have limited capabilities.
• Use them to:
• Gather info (profiling).
• Pass through the guard mechanism (appear as
legitimate low ring-high ring interaction).
• Trick the higher ring to do as you wish.
VERTICAL PE - HOW
VERTICAL PE - HOW
• XSS.
VERTICAL PE - HOW
• XSS.
• Password guessing/brute forcing.
VERTICAL PE - HOW
• XSS.
• Password guessing/brute forcing.
• Driver vulnerabilities.
VERTICAL PE - HOW
• XSS.
• Password guessing/brute forcing.
• Driver vulnerabilities.
• Service privileges.
VERTICAL PE - HOW
• XSS.
• Password guessing/brute forcing.
• Driver vulnerabilities.
• Service privileges.
• Design bug-features.
VERTICAL PE - HOW
• XSS.
• Password guessing/brute forcing.
• Driver vulnerabilities.
• Service privileges.
• Design bug-features.
• SE.
VERTICAL PE - HOW
• XSS.
• Password guessing/brute forcing.
• Driver vulnerabilities.
• Service privileges.
• Design bug-features.
• SE.
• Etc. Etc.
HORIZONTAL PE - HOW
HORIZONTAL PE - HOW
• XSS.
HORIZONTAL PE - HOW
• XSS.
• Session cookies theft.
HORIZONTAL PE - HOW
• XSS.
• Session cookies theft.
• Cross-tab data leakage.
HORIZONTAL PE - HOW
• XSS.
• Session cookies theft.
• Cross-tab data leakage.
• Password guessing/brute forcing.
HORIZONTAL PE - HOW
• XSS.
• Session cookies theft.
• Cross-tab data leakage.
• Password guessing/brute forcing.
• Hypervisor/driver data leakage.
HORIZONTAL PE - HOW
• XSS.
• Session cookies theft.
• Cross-tab data leakage.
• Password guessing/brute forcing.
• Hypervisor/driver data leakage.
• SE.
HORIZONTAL PE - HOW
• XSS.
• Session cookies theft.
• Cross-tab data leakage.
• Password guessing/brute forcing.
• Hypervisor/driver data leakage.
• SE.
• Etc. Etc.
EXAMPLES – LOOK MOM NO VULNS
EXAMPLES – LOOK MOM NO VULNS
• Service EXE overwriting.
EXAMPLES – LOOK MOM NO VULNS
• Service EXE overwriting.
• Unprotected autorun directories.
EXAMPLES – LOOK MOM NO VULNS
• Service EXE overwriting.
• Unprotected autorun directories.
• Misconfigurations.
EXAMPLES – LOOK MOM NO VULNS
• Service EXE overwriting.
• Unprotected autorun directories.
• Misconfigurations.
• Plain text passwords.
EXAMPLE – DLL HIJACKING
EXAMPLE – API EXPLOITATION
EXAMPLE – API EXPLOITATION
• User -> kernel.
EXAMPLE – API EXPLOITATION
• User -> kernel.
• Ntdll.dll – wrapper and guard.
EXAMPLE – API EXPLOITATION
• User -> kernel.
• Ntdll.dll – wrapper and guard.
• Wealth of info before attack.
EXAMPLE – API EXPLOITATION
• User -> kernel.
• Ntdll.dll – wrapper and guard.
• Wealth of info before attack.
• Kernel bug exploitation.
EXAMPLE – API EXPLOITATION
• User -> kernel.
• Ntdll.dll – wrapper and guard.
• Wealth of info before attack.
• Kernel bug exploitation.
• Often – make kernel mode run code from user mode.
QUESTIONS?

More Related Content

Similar to Intro To Privilege Elevation

Real Life InfoSec - Tel Aviv University
Real Life InfoSec - Tel Aviv UniversityReal Life InfoSec - Tel Aviv University
Real Life InfoSec - Tel Aviv UniversityMichael Shalyt
 
Top Ten Proactive Web Security Controls v5
Top Ten Proactive Web Security Controls v5Top Ten Proactive Web Security Controls v5
Top Ten Proactive Web Security Controls v5Jim Manico
 
Design for Scale / Surge 2010
Design for Scale / Surge 2010Design for Scale / Surge 2010
Design for Scale / Surge 2010Christopher Brown
 
RSA Conference 2010 San Francisco
RSA Conference 2010 San FranciscoRSA Conference 2010 San Francisco
RSA Conference 2010 San FranciscoAditya K Sood
 
The "Ops" Side of DevSecOps
The "Ops" Side of DevSecOps The "Ops" Side of DevSecOps
The "Ops" Side of DevSecOps Rundeck
 
'An Evolution Into Specification By Example' by Adam Knight
'An Evolution Into Specification By Example' by Adam Knight'An Evolution Into Specification By Example' by Adam Knight
'An Evolution Into Specification By Example' by Adam KnightTEST Huddle
 
Introduction to OWASP & Web Application Security
Introduction to OWASP & Web Application SecurityIntroduction to OWASP & Web Application Security
Introduction to OWASP & Web Application SecurityOWASPKerala
 
Andrew Polaszek - ZooBank: ICZN’s open-access web-based register of all new a...
Andrew Polaszek - ZooBank: ICZN’s open-access web-based register of all new a...Andrew Polaszek - ZooBank: ICZN’s open-access web-based register of all new a...
Andrew Polaszek - ZooBank: ICZN’s open-access web-based register of all new a...ICZN
 
Turning search upside down with powerful open source search software
Turning search upside down with powerful open source search softwareTurning search upside down with powerful open source search software
Turning search upside down with powerful open source search softwareCharlie Hull
 
Java EE 6 Security in practice with GlassFish
Java EE 6 Security in practice with GlassFishJava EE 6 Security in practice with GlassFish
Java EE 6 Security in practice with GlassFishMarkus Eisele
 
Test Automation in the Microservices Oriented Enterprise by Shawn Wallace
Test Automation in the Microservices Oriented Enterprise by Shawn WallaceTest Automation in the Microservices Oriented Enterprise by Shawn Wallace
Test Automation in the Microservices Oriented Enterprise by Shawn WallaceQA or the Highway
 
Slides for the #JavaOne Session ID: CON11881
Slides for the #JavaOne Session ID: CON11881Slides for the #JavaOne Session ID: CON11881
Slides for the #JavaOne Session ID: CON11881Masoud Kalali
 
RIoT (Raiding Internet of Things) by Jacob Holcomb
RIoT  (Raiding Internet of Things)  by Jacob HolcombRIoT  (Raiding Internet of Things)  by Jacob Holcomb
RIoT (Raiding Internet of Things) by Jacob HolcombPriyanka Aash
 
Startupfest 2012 - Coefficients of friction
Startupfest 2012 - Coefficients of frictionStartupfest 2012 - Coefficients of friction
Startupfest 2012 - Coefficients of frictionStartupfest
 
Fraud Detection with Hadoop
Fraud Detection with HadoopFraud Detection with Hadoop
Fraud Detection with Hadoopmarkgrover
 
Microservices and Teraflops: Effortlessly Scaling Data Science with PyWren wi...
Microservices and Teraflops: Effortlessly Scaling Data Science with PyWren wi...Microservices and Teraflops: Effortlessly Scaling Data Science with PyWren wi...
Microservices and Teraflops: Effortlessly Scaling Data Science with PyWren wi...Databricks
 
Onion and Swiss Cheese: Security Revisited
Onion and Swiss Cheese: Security RevisitedOnion and Swiss Cheese: Security Revisited
Onion and Swiss Cheese: Security RevisitedESUG
 

Similar to Intro To Privilege Elevation (20)

Real Life InfoSec - Tel Aviv University
Real Life InfoSec - Tel Aviv UniversityReal Life InfoSec - Tel Aviv University
Real Life InfoSec - Tel Aviv University
 
Top Ten Proactive Web Security Controls v5
Top Ten Proactive Web Security Controls v5Top Ten Proactive Web Security Controls v5
Top Ten Proactive Web Security Controls v5
 
Design for Scale / Surge 2010
Design for Scale / Surge 2010Design for Scale / Surge 2010
Design for Scale / Surge 2010
 
RSA Conference 2010 San Francisco
RSA Conference 2010 San FranciscoRSA Conference 2010 San Francisco
RSA Conference 2010 San Francisco
 
presentation
presentationpresentation
presentation
 
The "Ops" Side of DevSecOps
The "Ops" Side of DevSecOps The "Ops" Side of DevSecOps
The "Ops" Side of DevSecOps
 
'An Evolution Into Specification By Example' by Adam Knight
'An Evolution Into Specification By Example' by Adam Knight'An Evolution Into Specification By Example' by Adam Knight
'An Evolution Into Specification By Example' by Adam Knight
 
Ds @ bol
Ds @ bolDs @ bol
Ds @ bol
 
Introduction to OWASP & Web Application Security
Introduction to OWASP & Web Application SecurityIntroduction to OWASP & Web Application Security
Introduction to OWASP & Web Application Security
 
Andrew Polaszek - ZooBank: ICZN’s open-access web-based register of all new a...
Andrew Polaszek - ZooBank: ICZN’s open-access web-based register of all new a...Andrew Polaszek - ZooBank: ICZN’s open-access web-based register of all new a...
Andrew Polaszek - ZooBank: ICZN’s open-access web-based register of all new a...
 
Turning search upside down with powerful open source search software
Turning search upside down with powerful open source search softwareTurning search upside down with powerful open source search software
Turning search upside down with powerful open source search software
 
Java EE 6 Security in practice with GlassFish
Java EE 6 Security in practice with GlassFishJava EE 6 Security in practice with GlassFish
Java EE 6 Security in practice with GlassFish
 
Test Automation in the Microservices Oriented Enterprise by Shawn Wallace
Test Automation in the Microservices Oriented Enterprise by Shawn WallaceTest Automation in the Microservices Oriented Enterprise by Shawn Wallace
Test Automation in the Microservices Oriented Enterprise by Shawn Wallace
 
Slides for the #JavaOne Session ID: CON11881
Slides for the #JavaOne Session ID: CON11881Slides for the #JavaOne Session ID: CON11881
Slides for the #JavaOne Session ID: CON11881
 
RIoT (Raiding Internet of Things) by Jacob Holcomb
RIoT  (Raiding Internet of Things)  by Jacob HolcombRIoT  (Raiding Internet of Things)  by Jacob Holcomb
RIoT (Raiding Internet of Things) by Jacob Holcomb
 
Startupfest 2012 - Coefficients of friction
Startupfest 2012 - Coefficients of frictionStartupfest 2012 - Coefficients of friction
Startupfest 2012 - Coefficients of friction
 
Fraud Detection with Hadoop
Fraud Detection with HadoopFraud Detection with Hadoop
Fraud Detection with Hadoop
 
Microservices and Teraflops: Effortlessly Scaling Data Science with PyWren wi...
Microservices and Teraflops: Effortlessly Scaling Data Science with PyWren wi...Microservices and Teraflops: Effortlessly Scaling Data Science with PyWren wi...
Microservices and Teraflops: Effortlessly Scaling Data Science with PyWren wi...
 
Prototyping: Helping to take away the suck
Prototyping: Helping to take away the suckPrototyping: Helping to take away the suck
Prototyping: Helping to take away the suck
 
Onion and Swiss Cheese: Security Revisited
Onion and Swiss Cheese: Security RevisitedOnion and Swiss Cheese: Security Revisited
Onion and Swiss Cheese: Security Revisited
 

Recently uploaded

The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfkalichargn70th171
 
Diamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionDiamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionSolGuruz
 
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️anilsa9823
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...MyIntelliSource, Inc.
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...MyIntelliSource, Inc.
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...ICS
 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...OnePlan Solutions
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxComplianceQuest1
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsAlberto González Trastoy
 
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerHow To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerThousandEyes
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantAxelRicardoTrocheRiq
 
How To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsHow To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsAndolasoft Inc
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVshikhaohhpro
 
Test Automation Strategy for Frontend and Backend
Test Automation Strategy for Frontend and BackendTest Automation Strategy for Frontend and Backend
Test Automation Strategy for Frontend and BackendArshad QA
 
Clustering techniques data mining book ....
Clustering techniques data mining book ....Clustering techniques data mining book ....
Clustering techniques data mining book ....ShaimaaMohamedGalal
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxbodapatigopi8531
 
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Steffen Staab
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software DevelopersVinodh Ram
 
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdfWave PLM
 

Recently uploaded (20)

The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
 
Diamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionDiamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with Precision
 
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docx
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
 
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerHow To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service Consultant
 
How To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsHow To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.js
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTV
 
Test Automation Strategy for Frontend and Backend
Test Automation Strategy for Frontend and BackendTest Automation Strategy for Frontend and Backend
Test Automation Strategy for Frontend and Backend
 
Clustering techniques data mining book ....
Clustering techniques data mining book ....Clustering techniques data mining book ....
Clustering techniques data mining book ....
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptx
 
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software Developers
 
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf
 
Exploring iOS App Development: Simplifying the Process
Exploring iOS App Development: Simplifying the ProcessExploring iOS App Development: Simplifying the Process
Exploring iOS App Development: Simplifying the Process
 

Intro To Privilege Elevation

  • 1. Thinking in rings Michael Shalyt Malware Research Team Leader @ Check Point PRIVILEGE ESCALATION
  • 2. MICHAEL SHALYT – BIO-IN-A-GRAPH Technology Research
  • 3. MICHAEL SHALYT – BIO-IN-A-GRAPH Technology Research First program (8yo)
  • 4. MICHAEL SHALYT – BIO-IN-A-GRAPH Technology Research First program (8yo) ASM (13yo)
  • 5. MICHAEL SHALYT – BIO-IN-A-GRAPH Technology Research First program (8yo) ASM (13yo) IPHO 2005
  • 6. MICHAEL SHALYT – BIO-IN-A-GRAPH Technology Research First program (8yo) ASM (13yo) IPHO 2005 BSc. Physics + EE
  • 7. MICHAEL SHALYT – BIO-IN-A-GRAPH Technology Research First program (8yo) ASM (13yo) Cyber Cyber IPHO 2005 BSc. Physics + EE
  • 8. MICHAEL SHALYT – BIO-IN-A-GRAPH Technology Research First program (8yo) ASM (13yo) Cyber Cyber Reverse Engineering IPHO 2005 BSc. Physics + EE
  • 9. MICHAEL SHALYT – BIO-IN-A-GRAPH Technology Research First program (8yo) ASM (13yo) Cyber Cyber Reverse Engineering Research TL IPHO 2005 BSc. Physics + EE
  • 10. MICHAEL SHALYT – BIO-IN-A-GRAPH Technology Research First program (8yo) ASM (13yo) Cyber Cyber Reverse Engineering Research TL IPHO 2005 BSc. Physics + EE MSc. Quantum Information
  • 11. MICHAEL SHALYT – BIO-IN-A-GRAPH Technology Research First program (8yo) ASM (13yo) Cyber Cyber Reverse Engineering Research TL IPHO 2005 BSc. Physics + EE MSc. Quantum Information Malware Research TL @CP
  • 12. MICHAEL SHALYT – BIO-IN-A-GRAPH Technology Research First program (8yo) ASM (13yo) Matlab Javascript Actionscript Mathematica C Scheme Cyber Cyber Reverse Engineering Research TL Python IPHO 2005 BSc. Physics + EE MSc. Quantum Information Malware Research TL @CP Pascal AutoIT
  • 13. MICHAEL SHALYT – BIO-IN-A-GRAPH Technology Research First program (8yo) Lifeinagraph.blogspot.com ASM (13yo) Matlab Javascript Actionscript Mathematica C Scheme Cyber Cyber Reverse Engineering Research TL Python IPHO 2005 BSc. Physics + EE MSc. Quantum Information Malware Research TL @CP Pascal AutoIT Catapults Humans
  • 15. WHAT’S A HACKER? • People committed to circumvention of computer security.
  • 16. WHAT’S A HACKER? • People committed to circumvention of computer security. • RFC 1392: “A person who delights in having an intimate understanding of the internal workings of a system”. (1960s around MIT's Tech Model Railroad Club)
  • 17. WHAT’S A HACKER? • People committed to circumvention of computer security. • RFC 1392: “A person who delights in having an intimate understanding of the internal workings of a system”. (1960s around MIT's Tech Model Railroad Club) • Vs. “user” (like “script kiddies”)
  • 23. PRINCIPAL OF LEAST PRIVILEGE
  • 24. PRINCIPAL OF LEAST PRIVILEGE • System stability.
  • 25. PRINCIPAL OF LEAST PRIVILEGE • System stability. • Security.
  • 26. PRINCIPAL OF LEAST PRIVILEGE • System stability. • Security. • Ease of deployment.
  • 27. PRINCIPAL OF LEAST PRIVILEGE • System stability. • Security. • Ease of deployment. • In RL: Compartmentalization / Encapsulation.
  • 30. VERTICAL PE - WHAT • User -> admin.
  • 31. VERTICAL PE - WHAT • User -> admin. • User -> system/root.
  • 32. VERTICAL PE - WHAT • User -> admin. • User -> system/root. • Javascript -> shellcode.
  • 33. VERTICAL PE - WHAT • User -> admin. • User -> system/root. • Javascript -> shellcode. • Username -> access.
  • 34. VERTICAL PE - WHAT • User -> admin. • User -> system/root. • Javascript -> shellcode. • Username -> access. • Hypervisor instance traversal.
  • 35. VERTICAL PE - WHAT • User -> admin. • User -> system/root. • Javascript -> shellcode. • Username -> access. • Hypervisor instance traversal. • Access to restricted places/documents/data.
  • 36. VERTICAL PE - WHAT • User -> admin. • User -> system/root. • Javascript -> shellcode. • Username -> access. • Hypervisor instance traversal. • Access to restricted places/documents/data. • Etc.
  • 38. HORIZONTAL PE - WHAT • User impersonation (bank app credentials).
  • 39. HORIZONTAL PE - WHAT • User impersonation (bank app credentials). • User data theft (credit card).
  • 40. HORIZONTAL PE - WHAT • User impersonation (bank app credentials). • User data theft (credit card). • Hypervisor instance spying.
  • 41. HORIZONTAL PE - WHAT • User impersonation (bank app credentials). • User data theft (credit card). • Hypervisor instance spying. • Framing someone else.
  • 42. HORIZONTAL PE - WHAT • User impersonation (bank app credentials). • User data theft (credit card). • Hypervisor instance spying. • Framing someone else. • Etc.
  • 44. PE – BATTLE PLAN • You already have limited capabilities.
  • 45. PE – BATTLE PLAN • You already have limited capabilities. • Use them to: • Gather info (profiling).
  • 46. PE – BATTLE PLAN • You already have limited capabilities. • Use them to: • Gather info (profiling). • Pass through the guard mechanism (appear as legitimate low ring-high ring interaction).
  • 47. PE – BATTLE PLAN • You already have limited capabilities. • Use them to: • Gather info (profiling). • Pass through the guard mechanism (appear as legitimate low ring-high ring interaction). • Trick the higher ring to do as you wish.
  • 49. VERTICAL PE - HOW • XSS.
  • 50. VERTICAL PE - HOW • XSS. • Password guessing/brute forcing.
  • 51. VERTICAL PE - HOW • XSS. • Password guessing/brute forcing. • Driver vulnerabilities.
  • 52. VERTICAL PE - HOW • XSS. • Password guessing/brute forcing. • Driver vulnerabilities. • Service privileges.
  • 53. VERTICAL PE - HOW • XSS. • Password guessing/brute forcing. • Driver vulnerabilities. • Service privileges. • Design bug-features.
  • 54. VERTICAL PE - HOW • XSS. • Password guessing/brute forcing. • Driver vulnerabilities. • Service privileges. • Design bug-features. • SE.
  • 55. VERTICAL PE - HOW • XSS. • Password guessing/brute forcing. • Driver vulnerabilities. • Service privileges. • Design bug-features. • SE. • Etc. Etc.
  • 57. HORIZONTAL PE - HOW • XSS.
  • 58. HORIZONTAL PE - HOW • XSS. • Session cookies theft.
  • 59. HORIZONTAL PE - HOW • XSS. • Session cookies theft. • Cross-tab data leakage.
  • 60. HORIZONTAL PE - HOW • XSS. • Session cookies theft. • Cross-tab data leakage. • Password guessing/brute forcing.
  • 61. HORIZONTAL PE - HOW • XSS. • Session cookies theft. • Cross-tab data leakage. • Password guessing/brute forcing. • Hypervisor/driver data leakage.
  • 62. HORIZONTAL PE - HOW • XSS. • Session cookies theft. • Cross-tab data leakage. • Password guessing/brute forcing. • Hypervisor/driver data leakage. • SE.
  • 63. HORIZONTAL PE - HOW • XSS. • Session cookies theft. • Cross-tab data leakage. • Password guessing/brute forcing. • Hypervisor/driver data leakage. • SE. • Etc. Etc.
  • 64. EXAMPLES – LOOK MOM NO VULNS
  • 65. EXAMPLES – LOOK MOM NO VULNS • Service EXE overwriting.
  • 66. EXAMPLES – LOOK MOM NO VULNS • Service EXE overwriting. • Unprotected autorun directories.
  • 67. EXAMPLES – LOOK MOM NO VULNS • Service EXE overwriting. • Unprotected autorun directories. • Misconfigurations.
  • 68. EXAMPLES – LOOK MOM NO VULNS • Service EXE overwriting. • Unprotected autorun directories. • Misconfigurations. • Plain text passwords.
  • 69. EXAMPLE – DLL HIJACKING
  • 70. EXAMPLE – API EXPLOITATION
  • 71. EXAMPLE – API EXPLOITATION • User -> kernel.
  • 72. EXAMPLE – API EXPLOITATION • User -> kernel. • Ntdll.dll – wrapper and guard.
  • 73. EXAMPLE – API EXPLOITATION • User -> kernel. • Ntdll.dll – wrapper and guard. • Wealth of info before attack.
  • 74. EXAMPLE – API EXPLOITATION • User -> kernel. • Ntdll.dll – wrapper and guard. • Wealth of info before attack. • Kernel bug exploitation.
  • 75. EXAMPLE – API EXPLOITATION • User -> kernel. • Ntdll.dll – wrapper and guard. • Wealth of info before attack. • Kernel bug exploitation. • Often – make kernel mode run code from user mode.