Vbootkit2 0-AttackingWindows7viaBootSectors
Vbootkit2 0-AttackingWindows7viaBootSectors
0 - Attacking
Windows 7 via Boot Sectors
HITB-Dubai 2009
2009-4-23
Nitin Kumar
Security Researcher
[email protected]
Vipin Kumar
Security Researcher
[email protected]
What we do ?
Analysing malware
Code Reviewing
Network PenTests
2
Presentation outline
Introduction to Bootkits
Windows 7 boot process (x64)
Vbootkit 2.0 architecture and working
Vbootkit 2.0 Payloads aka shell-codes
Remote Command & Control protocol
Privilege escalation of programs
Demo
Remote Keylogger
Demo
Login without passwords
Demo
Vbootkit and DRM
Question time and Thanks
3
Introduction to Bootkits
4
Windows 7(x64) Boot Process
5
Windows 7(x64) Boot Process
6
Windows 7(x64) Boot Process
10
Vbootkit 2.0
11
Objective of Vbootkit 2.0
12
Overview
15
Vbootkit – Functional workout (cont.)
16
Vbootkit – Functional workout (cont.)
17
Vbootkit – Functional workout (cont.)
18
Vbootkit – Functional workout (cont.)
19
Summary of detours applied by Vbootkit 2.0
21
Remote Command & Control
22
Remote Command & Control protocol
23
Remote Command & Control protocol
Data
Response Packet
Command Packet
PING Packet
24
Remote Command & Control protocol
Return Response
Communication FLOW
25
Privilege Escalation
26
Privilege Escalation
. . .
…. …. ….
27
Token structure
29
Privilege Escalation Demonstration Time
30
Keyboard & mouse data flow in Windows
I8xGetByteAsynchronous
function in i8042 driver is
used to fetch data from the
chip. I8042 chip
It's declaration is
I8xGetByteAsynchronous(
char device,char* I8042prt driver
outputbyte)
31
Hooking i8042prt
32
Implementation in Vbootkit 2.0
33
Remote Keylogger Demonstration
34
Password Removal
35
Security Accounts Manager (SAM)
36
Windows 7 Password Checking algorithm
37
Password Length fields in V-value in SAM
38
Vbootkit 2.0 Password removal
39
Recovering Passwords
40
controlling passwords demo
41
Is this enough ??
42
of course, NOT
43
A quick question ?
44
Vbootkit & DRM
Questions ??
Comments ??
Ideas ??
email us
[email protected]
[email protected]
http://www.nvlabs.in
47
Thanks
48