Michael B. (@downwithupsec) 's Twitter Profile
Michael B.

@downwithupsec

Windows security researcher/reverse engineer. The more you know, the more you realize you don't.

ID: 1106726940554219520

linkhttps://downwithup.github.io/ calendar_today16-03-2019 01:20:39

53 Tweet

221 Followers

46 Following

Sinaei (@intel80x86) 's Twitter Profile Photo

The same method can be applied to Windows by replacing mcupdate_GenuineIntel.dll or mcupdate_AuthenticAMD.dll in c:\Windows\System32, you can downgrade Windows microcode updates this way.

Jonas L (@jonaslyk) 's Twitter Profile Photo

Unprivileged users are not allowed to create files in system32 folder- on hyper-v hosts they finally realised that unprivileged lives matters too as anyone can now create files there , with creater as owner, just open like this:

Unprivileged users are not allowed to create files in system32 folder- on hyper-v hosts they finally realised that unprivileged lives matters too as anyone can now create files there , with creater as owner, just open like this:
Michael B. (@downwithupsec) 's Twitter Profile Photo

@hFireF0X If anyone is interested, here is example usage. Basically identical to ProcessStateChange APIs: gist.github.com/DownWithUp/9cb…

Jonas L (@jonaslyk) 's Twitter Profile Photo

CVE-2020-16938 - aka bits please! So...recent update changed the permissions on partitions and volume device objects, granting everybody read access. This means that by opening the device directly you can read the raw data without any privs. 7zip parses NTFS so super for POC

CVE-2020-16938 - aka bits please!
So...recent update changed the permissions on partitions and volume device objects, granting everybody read access.
This means that by opening the device directly you can read the raw data without any privs.
7zip parses NTFS so super for POC
Michael B. (@downwithupsec) 's Twitter Profile Photo

Driver couldn't import from Win32k.sys? How five seconds of Googling could've saved me at least an hour: downwithup.github.io/Blog/7.html

Michael B. (@downwithupsec) 's Twitter Profile Photo

Just a quick little post on how to use the the undocumented API NtPssCaptureVaSpaceBulk to gather a process' virtual memory in a single call. Read more here: downwithup.github.io/Blog/8.html

Michael B. (@downwithupsec) 's Twitter Profile Photo

Here's an old project that I polished up a bit: github.com/DownWithUp/WHP… Essentially the idea was to have some introspection into an OS at the hypervisor level. It was also a foray into the Windows Hypervisor Platform API.

Michael B. (@downwithupsec) 's Twitter Profile Photo

Something interesting I stumbled upon: In Windows, for Intel's MPX, a driver could use KeRegisterBoundCallback to handle/hook the BOUND #BR exception. This function will eventually get called from the IDT's KiBoundFault

Michael B. (@downwithupsec) 's Twitter Profile Photo

Exporting registry data in the "hive" format seems to ignore the "BIOS" key under HKLM\HARDWARE\DESCRIPTION\System. You can export it directly, but exporting any parent will not contain the "BIOS" key and its values