BH_US_12_Tsai_Pan_Exploiting_Windows8_WP
BH_US_12_Tsai_Pan_Exploiting_Windows8_WP
BH_US_12_Tsai_Pan_Exploiting_Windows8_WP
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
5.2 A Broker Process Memory Corruption ........................................................................... 22<br />
6. Attack Design Logic ............................................................................................................... 25<br />
6.1 Bypass Internet Connection Limitation .......................................................................... 25<br />
6.2 Bypass Launch Program Limitation ................................................................................ 26<br />
6.3 Bypass File/Folder Access............................................................................................... 29<br />
7. Conclusion ............................................................................................................................. 29<br />
8. References ............................................................................................................................ 29<br />
9. Appendix ............................................................................................................................... 30<br />
9.1 Clsid with “ALL APPLICATION PACKAGE” launch permission ......................................... 30<br />
9.2 OpenWith.exe Vulnerability Details: .............................................................................. 31<br />
3