25.03.2017 Views

LPE vulnerabilities exploitation on Windows 10 Anniversary Update

eJwXM6v

eJwXM6v

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

• Preparing memory and use old SURFACE technique:<br />

GDI pool addresses leaks<br />

• We can leak addresses of some GDI structures or USER structures/data<br />

allocated <strong>on</strong> GDI pool.<br />

• We can find USER objects which are allocated <strong>on</strong> the GDI pool.<br />

• Based <strong>on</strong> both methods we can prepare memory for <str<strong>on</strong>g>exploitati<strong>on</strong></str<strong>on</strong>g>.<br />

• Main technique is allocati<strong>on</strong> of GDI object (SURFOBJ) <strong>on</strong> place of freed<br />

object/structure which address we can get. Then we can use old SURFACE<br />

corrupti<strong>on</strong> technique.<br />

• Using of USER objects was described at Ekoparty 2016, we’ll show using of<br />

data and structures.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!