Skip to content

Commit

Permalink
[post] Add links for English/Chinese versions in "Streaming vulnerabi…
Browse files Browse the repository at this point in the history
…lities - Part I"
  • Loading branch information
shaolin-tw committed Aug 23, 2024
1 parent 7b3acaa commit 6397dec
Show file tree
Hide file tree
Showing 5 changed files with 139 additions and 127 deletions.
10 changes: 7 additions & 3 deletions atom.xml
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,7 @@
<title>DEVCORE 戴夫寇爾</title>
<link href="https://devco.re/" rel="self"/>
<link href="https://devco.re"/>
<updated>2024-08-23T21:48:23+08:00</updated>
<updated>2024-08-24T02:27:52+08:00</updated>
<id>https://devco.re</id>
<author>
<name></name>
Expand All @@ -17,7 +17,9 @@
<link href="https://devco.re/blog/2024/08/23/streaming-vulnerabilities-from-windows-kernel-proxying-to-kernel-part1/"/>
<updated>2024-08-23T00:00:00+08:00</updated>
<id>https://devco.re/blog/2024/08/23/streaming-vulnerabilities-from-windows-kernel-proxying-to-kernel-part1</id>
<content type="html">&lt;p&gt;在過去的幾十年中 Windows Kernel 的漏洞層出不窮,熱門的攻擊面逐漸從 Win32k 慢慢轉移到 CLFS (Common Log File System) 上。微軟也持續且積極地修補這些漏洞,使得這些元件越來越安全。而下一個熱門的目標會是哪個元件呢?去年開始,MSKSSRV (Microsoft Kernel Streaming Service) 成為駭客喜愛的目標之一。這個驅動程式小到可以在幾天內完成分析。這是否意味著可能不太會有新的漏洞了?&lt;/p&gt;
<content type="html">&lt;p&gt;&lt;a href=&quot;blog/2024/08/23/streaming-vulnerabilities-from-windows-kernel-proxying-to-kernel-part1-en/&quot;&gt;English Version&lt;/a&gt;, &lt;a href=&quot;/blog/2024/08/23/streaming-vulnerabilities-from-windows-kernel-proxying-to-kernel-part1/&quot;&gt;中文版本&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;在過去的幾十年中 Windows Kernel 的漏洞層出不窮,熱門的攻擊面逐漸從 Win32k 慢慢轉移到 CLFS (Common Log File System) 上。微軟也持續且積極地修補這些漏洞,使得這些元件越來越安全。而下一個熱門的目標會是哪個元件呢?去年開始,MSKSSRV (Microsoft Kernel Streaming Service) 成為駭客喜愛的目標之一。這個驅動程式小到可以在幾天內完成分析。這是否意味著可能不太會有新的漏洞了?&lt;/p&gt;

&lt;p&gt;在這篇研究將講述一個長期被忽視的攻擊面,讓我們在兩個月內就找出了超過 10 個漏洞。此外,也將深入探討了一種 Proxy-Based 的邏輯漏洞類型,使我們可以忽略掉大多數的檢查,最終成功在 Pwn2Own Vancouver 2024 中,攻下 Windows 11 的項目。&lt;/p&gt;

Expand Down Expand Up @@ -514,7 +516,9 @@ ks 及 ksthunk 已經有很長一段時間沒有漏洞,但卻是個最容易
<link href="https://devco.re/blog/2024/08/23/streaming-vulnerabilities-from-windows-kernel-proxying-to-kernel-part1-en/"/>
<updated>2024-08-23T00:00:00+08:00</updated>
<id>https://devco.re/blog/2024/08/23/streaming-vulnerabilities-from-windows-kernel-proxying-to-kernel-part1-en</id>
<content type="html">&lt;p&gt;Over the past few decades, vulnerabilities in the Windows Kernel have emerged frequently. The popular attack surface has gradually shifted from Win32k to CLFS (Common Log File System). Microsoft has continuously patched these vulnerabilities, making these targets increasingly secure. However, which component might become the next attack target? Last year, MSKSSRV (Microsoft Kernel Streaming Service) became a popular target for hackers. However, this driver is tiny and can be analyzed in just a few days. Does this mean there might not be new vulnerabilities?&lt;/p&gt;
<content type="html">&lt;p&gt;&lt;a href=&quot;blog/2024/08/23/streaming-vulnerabilities-from-windows-kernel-proxying-to-kernel-part1-en/&quot;&gt;English Version&lt;/a&gt;, &lt;a href=&quot;/blog/2024/08/23/streaming-vulnerabilities-from-windows-kernel-proxying-to-kernel-part1/&quot;&gt;中文版本&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Over the past few decades, vulnerabilities in the Windows Kernel have emerged frequently. The popular attack surface has gradually shifted from Win32k to CLFS (Common Log File System). Microsoft has continuously patched these vulnerabilities, making these targets increasingly secure. However, which component might become the next attack target? Last year, MSKSSRV (Microsoft Kernel Streaming Service) became a popular target for hackers. However, this driver is tiny and can be analyzed in just a few days. Does this mean there might not be new vulnerabilities?&lt;/p&gt;

&lt;p&gt;This research will discuss an overlooked attack surface that allowed us to find more than ten vulnerabilities within two months. Additionally, we will delve into a proxy-based logical vulnerability type that allows us to bypass most validations, enabling us to successfully exploit Windows 11 in Pwn2Own Vancouver 2024.&lt;/p&gt;

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -518,6 +518,8 @@ <h1>

<!-- 文章內容 -->
<div class="article_content">
<p><a href="blog/2024/08/23/streaming-vulnerabilities-from-windows-kernel-proxying-to-kernel-part1-en/">English Version</a>, <a href="/blog/2024/08/23/streaming-vulnerabilities-from-windows-kernel-proxying-to-kernel-part1/">中文版本</a></p>

<p>Over the past few decades, vulnerabilities in the Windows Kernel have emerged frequently. The popular attack surface has gradually shifted from Win32k to CLFS (Common Log File System). Microsoft has continuously patched these vulnerabilities, making these targets increasingly secure. However, which component might become the next attack target? Last year, MSKSSRV (Microsoft Kernel Streaming Service) became a popular target for hackers. However, this driver is tiny and can be analyzed in just a few days. Does this mean there might not be new vulnerabilities?</p>

<p>This research will discuss an overlooked attack surface that allowed us to find more than ten vulnerabilities within two months. Additionally, we will delve into a proxy-based logical vulnerability type that allows us to bypass most validations, enabling us to successfully exploit Windows 11 in Pwn2Own Vancouver 2024.</p>
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -552,6 +552,8 @@ <h1>

<!-- 文章內容 -->
<div class="article_content">
<p><a href="blog/2024/08/23/streaming-vulnerabilities-from-windows-kernel-proxying-to-kernel-part1-en/">English Version</a>, <a href="/blog/2024/08/23/streaming-vulnerabilities-from-windows-kernel-proxying-to-kernel-part1/">中文版本</a></p>

<p>在過去的幾十年中 Windows Kernel 的漏洞層出不窮,熱門的攻擊面逐漸從 Win32k 慢慢轉移到 CLFS (Common Log File System) 上。微軟也持續且積極地修補這些漏洞,使得這些元件越來越安全。而下一個熱門的目標會是哪個元件呢?去年開始,MSKSSRV (Microsoft Kernel Streaming Service) 成為駭客喜愛的目標之一。這個驅動程式小到可以在幾天內完成分析。這是否意味著可能不太會有新的漏洞了?</p>

<p>在這篇研究將講述一個長期被忽視的攻擊面,讓我們在兩個月內就找出了超過 10 個漏洞。此外,也將深入探討了一種 Proxy-Based 的邏輯漏洞類型,使我們可以忽略掉大多數的檢查,最終成功在 Pwn2Own Vancouver 2024 中,攻下 Windows 11 的項目。</p>
Expand Down
12 changes: 8 additions & 4 deletions rss.xml
Original file line number Diff line number Diff line change
Expand Up @@ -4,15 +4,17 @@
<title>DEVCORE 戴夫寇爾</title>
<description>DEVCORE 戴夫寇爾 - 紅隊演練服務、滲透測試服務、資安教育訓練、資安顧問服務</description>
<link>https://devco.re</link>
<lastBuildDate>Fri, 23 Aug 2024 21:48:23 +0800</lastBuildDate>
<pubDate>Fri, 23 Aug 2024 21:48:23 +0800</pubDate>
<lastBuildDate>Sat, 24 Aug 2024 02:27:52 +0800</lastBuildDate>
<pubDate>Sat, 24 Aug 2024 02:27:52 +0800</pubDate>
<ttl>1800</ttl>
<atom:link href="https://devco.re/rss" rel="self" type="application/rss+xml" />


<item>
<title>Streaming vulnerabilities from Windows Kernel - Proxying to Kernel - Part I</title>
<description>&lt;p&gt;在過去的幾十年中 Windows Kernel 的漏洞層出不窮,熱門的攻擊面逐漸從 Win32k 慢慢轉移到 CLFS (Common Log File System) 上。微軟也持續且積極地修補這些漏洞,使得這些元件越來越安全。而下一個熱門的目標會是哪個元件呢?去年開始,MSKSSRV (Microsoft Kernel Streaming Service) 成為駭客喜愛的目標之一。這個驅動程式小到可以在幾天內完成分析。這是否意味著可能不太會有新的漏洞了?&lt;/p&gt;
<description>&lt;p&gt;&lt;a href=&quot;blog/2024/08/23/streaming-vulnerabilities-from-windows-kernel-proxying-to-kernel-part1-en/&quot;&gt;English Version&lt;/a&gt;, &lt;a href=&quot;/blog/2024/08/23/streaming-vulnerabilities-from-windows-kernel-proxying-to-kernel-part1/&quot;&gt;中文版本&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;在過去的幾十年中 Windows Kernel 的漏洞層出不窮,熱門的攻擊面逐漸從 Win32k 慢慢轉移到 CLFS (Common Log File System) 上。微軟也持續且積極地修補這些漏洞,使得這些元件越來越安全。而下一個熱門的目標會是哪個元件呢?去年開始,MSKSSRV (Microsoft Kernel Streaming Service) 成為駭客喜愛的目標之一。這個驅動程式小到可以在幾天內完成分析。這是否意味著可能不太會有新的漏洞了?&lt;/p&gt;

&lt;p&gt;在這篇研究將講述一個長期被忽視的攻擊面,讓我們在兩個月內就找出了超過 10 個漏洞。此外,也將深入探討了一種 Proxy-Based 的邏輯漏洞類型,使我們可以忽略掉大多數的檢查,最終成功在 Pwn2Own Vancouver 2024 中,攻下 Windows 11 的項目。&lt;/p&gt;

Expand Down Expand Up @@ -509,7 +511,9 @@ ks 及 ksthunk 已經有很長一段時間沒有漏洞,但卻是個最容易

<item>
<title>Streaming vulnerabilities from Windows Kernel - Proxying to Kernel - Part I</title>
<description>&lt;p&gt;Over the past few decades, vulnerabilities in the Windows Kernel have emerged frequently. The popular attack surface has gradually shifted from Win32k to CLFS (Common Log File System). Microsoft has continuously patched these vulnerabilities, making these targets increasingly secure. However, which component might become the next attack target? Last year, MSKSSRV (Microsoft Kernel Streaming Service) became a popular target for hackers. However, this driver is tiny and can be analyzed in just a few days. Does this mean there might not be new vulnerabilities?&lt;/p&gt;
<description>&lt;p&gt;&lt;a href=&quot;blog/2024/08/23/streaming-vulnerabilities-from-windows-kernel-proxying-to-kernel-part1-en/&quot;&gt;English Version&lt;/a&gt;, &lt;a href=&quot;/blog/2024/08/23/streaming-vulnerabilities-from-windows-kernel-proxying-to-kernel-part1/&quot;&gt;中文版本&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Over the past few decades, vulnerabilities in the Windows Kernel have emerged frequently. The popular attack surface has gradually shifted from Win32k to CLFS (Common Log File System). Microsoft has continuously patched these vulnerabilities, making these targets increasingly secure. However, which component might become the next attack target? Last year, MSKSSRV (Microsoft Kernel Streaming Service) became a popular target for hackers. However, this driver is tiny and can be analyzed in just a few days. Does this mean there might not be new vulnerabilities?&lt;/p&gt;

&lt;p&gt;This research will discuss an overlooked attack surface that allowed us to find more than ten vulnerabilities within two months. Additionally, we will delve into a proxy-based logical vulnerability type that allows us to bypass most validations, enabling us to successfully exploit Windows 11 in Pwn2Own Vancouver 2024.&lt;/p&gt;

Expand Down
Loading

0 comments on commit 6397dec

Please # to comment.