View Single Post
  #5  
Old August 23rd 18, 04:56 AM posted to alt.comp.os.windows-10,alt.comp.hardware.pc-homebuilt
VanguardLH[_2_]
external usenet poster
 
Posts: 1,453
Default "New "Turning Tables" Technique Bypasses All Windows Kernel Mitigations"

Andy Burns wrote:

VanguardLH wrote:

Andy Burns wrote:

Lynn McGuire wrote:

there is an awesome new exploit that might pass them all

Does the does the exploit only work for instances of Windows running
under Hyper-V?


Just because the article mentions "virtual" has nothing to do with
virtual machines, like Hyper-V


Well they spent a lot of time during their presentation discussing
Hyper-V, that it semi-implied that the extra level of page tables and
sharing had something to do with it the exploit, I started to fast
forward through it when the "errrmm"s got too much.


Don't know what is the speaker's native language but I gave up trying to
decipher his lack of command of English. If I listened longer, I'd
probably get the gist of his English cant to figure out more of what he
said. Like you, the eh's, ah's, and other interjections were just too
overwhelming to spend time listening to it all. You hear "pity" as a
word when the speaker was trying to say "p", "t", "e" (for the PTE
acronym), and "stupidees" for "2 PTEs". Forget about hearing "POSIX"
because "x" (ecks) is not something the speaker can pronounce. Possibly
the audience was more familiar with the speakers by having spend more
time to aclimate to the speaker's English pronounciations. I didn't
bother trying to find who attend the BSide seminar to know the
composition of that audience.

Too many times someone will write something thinking that because they
authored the document that they will also orate it well. Need to
practice those speeches before giving them no matter what language(s)
you speak. You need to know where you are going to eliminate making
repeated corrections via interjections to pause while regaining your
bearings. With the speaker always looking at his screen and presenting
slides, I suspect all the speaker had for notes were the slides and he
orated on the fly. That is, didn't seem the speaker had a [practiced]
speech to present using slides only to reinforce points made in a
speech. Could be the timing between their POC and BSide were too close
to write up and rehearse a speech, just collect a bunch of slides.

Both look to have many years in security research from profiles that I
found about them online. Just wish they actually had a prepared speech
that they practiced and used the slides to highlight some points in a
speech, and to publish their speech if they had one (or have someone add
English subtitles to the video but with the interjections omitted).

The virtualization (meaning virtual machines) started at about 9:06.52,
about 8 minutes after the start of the presentation. I didn't get that
far the first time I watched the video. Like you said, the speaker had
tons of interjections that shows the speaker doesn't know where they are
heading (because they didn't have an actual speech to practice). I
think that gets into how the OS (well, more likely the VMM - virtual
machine manager) will protect the pages in memory for the VMs to stay
isolated. The speaker kept mentioning PTEs (Page Table Entries) which
the OS employs on behalf of the VMM for use by guest OS' virtualized
memory.

Since this wasn't a classroom where students could interrupt with
questions but rather a presentation where the speaker keeps talking and
might take questions at the end, there really should be a speech
available online rather than just a bunch of slides that carry little
information without the speech to glue together the slides. Since there
was no speech, there isn't a copy available that I could find.

https://cdn2.hubspot.net/hubfs/48790...les_Slides.pdf

That has the slides which convey some information but not really about
how that information can be exploited in practice.

https://blog.ensilo.com/bypassing-kernel-mitigations

That's a recap (probably written afterward) that omits the details of
the BSide presentation.