Finding Windows Kernel Vulnerabilities Automatically

Поделиться
HTML-код
  • Опубликовано: 28 июн 2024
  • #hacking #education #reverseengineering #training
    In this video we take a look at CVE-2021-31956, how it works, and how to write a script to find it using Binary Ninja.
    Check out our trainings at binary.ninja/training/
    SecureList.com's original blog post: securelist.com/puzzlemaker-ch...
    This is the "vulnerable file" we used: msdl.microsoft.com/download/s...
    This is the "patched version" we used: msdl.microsoft.com/download/s...
    [00:00:00] Intro
    [00:00:14] Overview of the Bug
    [00:01:13] Looking at it in Binary Ninja
    [00:01:34] Modeling Vulnerabilities
    [00:02:07] Writing the Script
    [00:04:49] Inspecting the Results
    [00:05:39] Conclusion
  • НаукаНаука

Комментарии • 5

  • @MartinCharles
    @MartinCharles 8 месяцев назад +2

    These videos are very helpful. I didn't know about:
    * Hex autolinking from the console
    * Snippets plugin
    * current_ globals
    * Tab completion
    I've been like a blind man stumbling around in a cave, this video is super helpful. Please make more

  • @0xLegacyy
    @0xLegacyy 8 месяцев назад +3

    I've been trying to write a plugin to find very similar issues, this is awesome. Thanks :)

  • @doanthanh5177
    @doanthanh5177 8 месяцев назад +2

    amazing

  • @doanthanh5177
    @doanthanh5177 8 месяцев назад +1

    which training class does the guy refer to?

    • @Vector35
      @Vector35  8 месяцев назад +1

      This suggestion was from one of our Program Analysis for Vulnerability Research classes, with Margin Research, but we have a Binary Ninja for Reverse Engineers just around the corner that will go in-depth about using our ILs, writing scripts and plugins, decompilation theory, and a lot of other interesting topics as well! shop.binary.ninja/products/bnre-november-2023