Finding Windows Kernel Vulnerabilities Automatically
HTML-код
- Опубликовано: 28 июн 2024
- #hacking #education #reverseengineering #training
In this video we take a look at CVE-2021-31956, how it works, and how to write a script to find it using Binary Ninja.
Check out our trainings at binary.ninja/training/
SecureList.com's original blog post: securelist.com/puzzlemaker-ch...
This is the "vulnerable file" we used: msdl.microsoft.com/download/s...
This is the "patched version" we used: msdl.microsoft.com/download/s...
[00:00:00] Intro
[00:00:14] Overview of the Bug
[00:01:13] Looking at it in Binary Ninja
[00:01:34] Modeling Vulnerabilities
[00:02:07] Writing the Script
[00:04:49] Inspecting the Results
[00:05:39] Conclusion Наука
These videos are very helpful. I didn't know about:
* Hex autolinking from the console
* Snippets plugin
* current_ globals
* Tab completion
I've been like a blind man stumbling around in a cave, this video is super helpful. Please make more
I've been trying to write a plugin to find very similar issues, this is awesome. Thanks :)
amazing
which training class does the guy refer to?
This suggestion was from one of our Program Analysis for Vulnerability Research classes, with Margin Research, but we have a Binary Ninja for Reverse Engineers just around the corner that will go in-depth about using our ILs, writing scripts and plugins, decompilation theory, and a lot of other interesting topics as well! shop.binary.ninja/products/bnre-november-2023