[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <032801c69608$7d828b90$c101a8c0@pitgroup.local>
Date: Thu Jun 22 15:33:29 2006
From: massimo at grandmedia.si (...)
Subject: Re: SyScan'06 Highlight - Attacking Microsoft New
Operating System (Vista)
i wonder if joanna knows how much free consultancy she is giving to MS
doing this on the beta 2 kernel
----- Original Message -----
From: "thomas48" <thomas48@...gnet.com.sg>
To: <security-basics@...urityfocus.com>; <firewalls@...urityfocus.com>;
<full-disclosure@...ts.grok.org.uk>; <bugtraq@...urityfocus.com>;
<focus-ids@...urityfocus.com>; <newslist@...urity-briefings.com>;
<forensics@...urityfocus.com>; <vuln-dev@...urityfocus.com>;
<webappsec@...urityfocus.com>
Cc: <organiser@...can.org>
Sent: Sunday, June 18, 2006 4:36 PM
Subject: SyScan'06 Highlight - Attacking Microsoft New Operating System
(Vista)
> This is a brand new presentation and its going public for the very first
> time in SyScan'06.
>
> Joanna Rutkowska, a senior researcher of COSEINC Research, will present
> her latest technique in bypassing and attacking the latest Mircosoft Vista
> operating system kernel.
>
> The presentation will first present how to generically (i.e. not relaying
> on any implementation bug) insert arbitrary code into the latest Vista
> Beta 2 kernel (x64 edition), thus effectively bypassing the (in)famous
> Vista policy for allowing only digitally singed code to be loaded into
> kernel. The presented attack does not requite system reboot.
>
> Next, creation of Stealth by Design malware for Vista x64 will be briefly
> discussed. This will be the base for introducing the new approach
> (codenamed 'blue pill') for writing undetectable malware on the latest
> AMD64 processors. The ultimate goal is to demonstrate that is possible (or
> soon will be) to create an undetectable malware which is not based on a
> concept, but, similarly to modern cryptography, on the strength of the
> 'algorithm'.
>
> A working blue pill will be demonstrated.
>
> Please visit www.syscan.org for more.
>
>
>
Powered by blists - more mailing lists