11.01.2015 Views

BH_US_12_Tsai_Pan_Exploiting_Windows8_WP

BH_US_12_Tsai_Pan_Exploiting_Windows8_WP

BH_US_12_Tsai_Pan_Exploiting_Windows8_WP

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

5.2 A Broker Process Memory Corruption ........................................................................... 22<br />

6. Attack Design Logic ............................................................................................................... 25<br />

6.1 Bypass Internet Connection Limitation .......................................................................... 25<br />

6.2 Bypass Launch Program Limitation ................................................................................ 26<br />

6.3 Bypass File/Folder Access............................................................................................... 29<br />

7. Conclusion ............................................................................................................................. 29<br />

8. References ............................................................................................................................ 29<br />

9. Appendix ............................................................................................................................... 30<br />

9.1 Clsid with “ALL APPLICATION PACKAGE” launch permission ......................................... 30<br />

9.2 OpenWith.exe Vulnerability Details: .............................................................................. 31<br />

3

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!