Home Cyber Security Sneaky Privilege Escalation Methodology Bypasses Home windows Safety

Sneaky Privilege Escalation Methodology Bypasses Home windows Safety

0
Sneaky Privilege Escalation Methodology Bypasses Home windows Safety

[ad_1]

Aug 17, 2023THNEndpoint Safety / Vulnerability

A beforehand undetected assault technique known as NoFilter has been discovered to abuse the Home windows Filtering Platform (WFP) to attain privilege escalation within the Home windows working system.

“If an attacker has the flexibility to execute code with admin privilege and the goal is to carry out LSASS Shtinkering, these privileges will not be sufficient,” Ron Ben Yizhak, a safety researcher at Deep Intuition, advised The Hacker Information.

“Operating as “NT AUTHORITYSYSTEM” is required. The strategies described on this analysis can escalate from admin to SYSTEM.”

The findings have been introduced on the DEF CON safety convention over the weekend.

Cybersecurity

The start line of the analysis is an in-house instrument known as RPC Mapper the cybersecurity firm used to map distant process name (RPC) strategies, particularly people who invoke WinAPI, resulting in the invention of a way named “BfeRpcOpenToken,” which is a part of WFP.

WFP is a set of API and system companies that is used to course of community site visitors and permit configuring filters that let or block communications.

“The deal with desk of one other course of might be retrieved by calling NtQueryInformationProcess,” Ben Yizhak mentioned. “This desk lists the tokens held by the method. The handles to these tokens might be duplicated for one more course of to escalate to SYSTEM.”

Cybersecurity

Whereas entry tokens serve to determine the person concerned when a privileged activity is executed, a bit of malware working in person mode can entry tokens of different processes utilizing particular features (e.g., DuplicateToken or DuplicateHandle) after which use that token to launch a baby course of with SYSTEM privileges.

However the aforementioned approach, per the cybersecurity agency, might be modified to carry out the duplication within the kernel through WFP, making it each evasive and stealthy by leaving barely any proof or logs.

In different phrases, the NoFilter can launch a brand new console as “NT AUTHORITYSYSTEM” or as one other person that’s logged on to the machine.

“The takeaway is that new assault vectors might be discovered by wanting into built-in parts of the OS, such because the Home windows Filtering Platform,” Ben Yizhak mentioned, including the strategies “keep away from WinAPI which might be monitored by safety merchandise.”

Discovered this text fascinating? Observe us on Twitter and LinkedIn to learn extra unique content material we submit.



[ad_2]