13.02.2017 Views

Talos Vulndev

Harnessing%20Intel%20Processor%20Trace%20on%20Windows%20for%20Vulnerability%20Discovery%20-%20rjohnson

Harnessing%20Intel%20Processor%20Trace%20on%20Windows%20for%20Vulnerability%20Discovery%20-%20rjohnson

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

• CR3 physical page swappable?<br />

• Quick analysis shows that in Windows 10586<br />

• Only the main PML4 table page is always in memory<br />

• Otherwise make use of the PIP packets<br />

• The problem of the spawned processes has been resolved using the trace by<br />

IP – detect when a new process is spawned and add the new range<br />

OR<br />

• Use the tracing by CPL and parse the PIP packets

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!