Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2018-8453 PoC — Microsoft Windows 权限许可和访问控制漏洞

Source
Associated Vulnerability
Title:Microsoft Windows 权限许可和访问控制漏洞 (CVE-2018-8453)
Description:Microsoft Windows Server 2019等都是美国微软(Microsoft)公司发布的一系列操作系统。Microsoft Windows Server 2019是一套服务器使用的操作系统。Windows 10是一套个人电脑使用的操作系统。 Microsoft Windows中存在提权漏洞,该漏洞源于Win32k组件没有正确的处理内存对象。本地攻击者可通过登录系统并运行特制的应用程序利用该漏洞在内核模式下以提升的权限执行代码。以下版本受到影响:Microsoft Windows Serve
Readme
# leHACK 2019: Analyzing CVE-2018-8453: An interesting tale of UAF and Double Free in Windows Kernel

This talk was delivered at [leHACK 2019](https://lehack.org/en/planning/en-analyzing-cve-2018-8453-an-interesting-tale-of-uaf-and-double-free-in-windows-kernel)

## Abstract
In this talk, we discuss intricate details of exploitation of CVE-2018-8453, a vulnerability in win32.sys Microsoft Windows driver. It which was reported by Kaspersky Lab as it was being used in highly targeted attacks.

In this talk, we discuss its intricate details, how to reproduce it and how to exploit the vulnerability on different versions of Windows as the vulnerable code is present in Windows 7, 8.1 and 10 as well (though we will be demonstrating it on Windows 7 and Windows 10 only).

# Key takeaways

After attending the talk, the attendees will have knowledge about: 

* How to do binary diffing 
* Locating vulnerable code from description of vulnerability 
* Exploiting Use After Free vulnerability in Windows Kernel 
* Exploiting double free vulnerability in Windows Kernel 
* Various challenges in writing kernel exploits (mitigations and bypasses) 
* Performing Heap Spray and Data Only Attacks (on different Windows versions)

# Twitter
* [Himanshu Khokhar Jaat](https://twitter.com/pwnrip)
* [Shivam Trivedi](https://twitter.com/shivamtrivedi18)
File Snapshot

[4.0K] /data/pocs/a23456621d0c3f7432d431e13b3c6763bde366dd ├── [1.2M] leHack.pdf ├── [1.9M] leHack.pptx ├── [1.0K] LICENSE ├── [1.3K] README.md ├── [ 17M] Windows10.mkv └── [ 24M] Windows7.mkv 0 directories, 6 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.