This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Vbootkit 2.0: Attacking Windows 7 Via Boot
From OWASP
Revision as of 06:55, 24 July 2009 by Dhruvsoi (talk | contribs) (Created page with 'This talk will introduce a new tool which allows attacks against Windows 7 via boot sectors. In this talk, Vbootkit 2.0 will be demonstrated in action to show how to bypass and c…')
This talk will introduce a new tool which allows attacks against Windows 7 via boot sectors. In this talk, Vbootkit 2.0 will be demonstrated in action to show how to bypass and circumvent security policies/architecture using customized boot sectors for Windows 7 (x64). The talk will cover:
- Windows 7 Boot architecture
- Vbootkit 2.0 architecture and inner workings
- Insight into the Windows 7 minkernel
Demonstration will also include:
- The use of Vbootkit in gaining access to a system without leaving traces
- Leveraging normal programs to escalate system privileges
- Remote control windows 7 using ping packets
- Remote key logger
- Running unsigned code in kernel
All this is done, without having any footprint on the HDD (everything is in memory). It also remains invisible to all existing anti-virus solutions.