today-0day
NotionGithubSiteContact
Korean
Korean
  • Introduction
    • ๐ŸšฉWindows Driver 0-day Research
    • ๐Ÿซ‚Team. ์šฐ๋ฆฌ ์˜ค๋Š˜๋ถ€ํ„ฐ 0-day
  • backgrounds
    • Windows Driver
    • Related Works
  • Our Approach
    • ๊ฐœ์š”
    • ๐Ÿ‡Init Analyzer
    • ๐Ÿ˜กangr-PT
    • ๐ŸฅŒMS Fuzzer
      • Playmaker mode
      • Qemu-nyx
      • Redqueen
      • Multiple Driver Tracing
      • Call Stack Parser
    • How to Use
  • Appendix
    • References
    • Achievments
    • ๐Ÿ”—Team page
    • ๐Ÿ”—CODE BLUE 2024
Powered by GitBook
On this page
  • Introduction
  • Our Achievements
  • Our Goal
  • Why?
  1. Introduction

Windows Driver 0-day Research

NextTeam. ์šฐ๋ฆฌ ์˜ค๋Š˜๋ถ€ํ„ฐ 0-day

Last updated 2 months ago

Introduction

Windows Kernel Driver์— ๋Œ€ํ•œ ์•ฝ 100์ผ ๋™์•ˆ์˜ ์—ฐ๊ตฌ ๊ณผ์ •์„ ์š”์•ฝํ•˜๊ธฐ ์œ„ํ•ด ์ž‘์„ฑ๋œ ๋ฌธ์„œ์ž…๋‹ˆ๋‹ค.

Our Achievements

  • 120+ Reporting

    • 100+ Security Bugs (Report to Vendors)

    • 20+ LPE (Local Privilege Esclation)

  • Especially, Find 11 security bugs and Get 3 CVE from Microsoft built-in Driver

Our Goal

Windows Kernel Driver ์ทจ์•ฝ์ ์„ ์ฐพ๋Š” ๋ฐ์—๋Š” ๋‘ ๊ฐ€์ง€ ๋ฐฉ๋ฒ•์„ ์‚ฌ์šฉํ–ˆ์Šต๋‹ˆ๋‹ค.

  1. Binary Analysis์—์„œ ์–ป์€ ๊ฒฝํ—˜์„ ๊ธฐ๋ฐ˜์œผ๋กœ

  2. Fuzzer๋ฅผ ์ œ์ž‘ํ•˜์—ฌ Fuzzing์„ ์ˆ˜ํ–‰

์ด๋กœ์จ ํ”„๋กœ์ ํŠธ ๊ธฐ๊ฐ„ ์ค‘ target์œผ๋กœํ•œ Driver์—์„œ ์ทจ์•ฝ์ ์„ ๋ฐœ๊ฒฌํ•  ๋ฟ๋งŒ ์•„๋‹ˆ๋ผ Offensive Researcher ๋ฐ Driver Developer๊ฐ€ ๊ณต๊ฒฉ์ž๋ณด๋‹ค ์†์‰ฝ๊ณ  ๋น ๋ฅด๊ฒŒ ์ทจ์•ฝ์ ์„ ์ฐพ์•„๋‚ผ ์ˆ˜ ์žˆ๋„๋ก ํ•˜์—ฌ ์ตœ์ข…์ ์œผ๋กœ Windows ์ƒํƒœ๊ณ„ ๋ณด์•ˆ์— ์ง€์†์ ์ธ ๊ธฐ์—ฌ๋ฅผ ํ•˜๋Š” ๊ฒƒ์„ ๋ชฉํ‘œ๋กœ ํ–ˆ์Šต๋‹ˆ๋‹ค.

์ €ํฌ๋Š” ์ทจ์•ฝ์ ์ด ๊ณง ์‚ฌ์šฉ์ž๊ฐ€ ๋งŽ์€ ์ œํ’ˆ์—์„œ ๋ฐœ์ƒ๋  ๋•Œ ํฐ ๊ฐ€์น˜๋ฅผ ์ง€๋‹Œ๋‹ค๊ณ  ์ƒ๊ฐํ•˜์˜€์Šต๋‹ˆ๋‹ค. ๋”ฐ๋ผ์„œ ์ „์„ธ๊ณ„์—์„œ ๋‹ค์–‘ํ•œ ์šฉ๋„๋กœ ๋„๋ฆฌ ์‚ฌ์šฉ๋˜๋Š” Windows์—์„œ, ํŠนํžˆ OS ์ „์ฒด์— ์˜ํ–ฅ์„ ๋ผ์น  ์ˆ˜ ์žˆ๋Š” Kernel Driver๋ฅผ ๋Œ€์ƒ์œผ๋กœ ์„ ์ •ํ•˜๊ฒŒ ๋˜์—ˆ์Šต๋‹ˆ๋‹ค. ๋˜ํ•œ์‚ฌ์šฉ์ž ๋ชจ๋“œ ์‘์šฉ ํ”„๋กœ๊ทธ๋žจ๊ณผ ๋‹ฌ๋ฆฌ Kernel Driver๋Š” ์ตœ๋Œ€ SYSTEM ๊ถŒํ•œ๊นŒ์ง€ ์นจํ•ด๋  ์ˆ˜ ์žˆ์–ด ๊ทธ ์ค‘์š”์„ฑ์ด ๋”์šฑ ํฝ๋‹ˆ๋‹ค.

๊ณต๊ฒฉ์ž๋Š” Windows CLFS.sys ๋“œ๋ผ์ด๋ฒ„์˜ LPE ์ทจ์•ฝ์ ์„ exploitํ•˜์—ฌ ๊ถŒํ•œ ์ƒ์Šน์„ ์ˆ˜ํ–‰ํ•œ ๋‹ค์Œ, Post Exploit์œผ๋กœ ๋ฐฑ๋„์–ด๋ฅผ ๊ฐ์—ผ์‹œํ‚จ ๋’ค Nokoyawa ๋žœ์„ฌ์›จ์–ด๋ฅผ ์ตœ์ข… ํŽ˜์ด๋กœ๋“œ๋กœ ๋ฐฐํฌํ•˜๋ ค๊ณ  ์‹œ๋„ํ–ˆ์Šต๋‹ˆ๋‹ค.

Why?

์˜ˆ๋ฅผ ๋“ค์–ด SECURELIST by Kaspersky์— ๋ฐœํ–‰๋œ ํฌ์ŠคํŠธ์—์„œ Windows Kernel Driver๊ฐ€ In-the-Wild์—์„œ Exploit๋œ ์‚ฌ๋ก€๋ฅผ ํ™•์ธํ•  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค.

๐Ÿ‘
๐ŸŽ‰
๐ŸŽฏ
๐Ÿ’Ž
"Nokoyawa ransomware attacks with Windows zero-day"
๐Ÿšฉ
Page cover image