Windows Mitigations – understanding, tactics and tools

Windows is one of the most secure operating systems now after long history of being attacked by hackers. With many defense mechanisms it has, many mitigations the operating system has played a key role in enhanching it’s overall security. With this training, we want to discuss how state-of-the-art mitigations are implemeneted and can be used to improve overall security levels of your machines and network. We want to start from traditional anti-exploit mitigations like ASLR, DEP and CFG and want to talk about basic isolation techniques like PPL to WDAG, more advanced mode of isolation.

Time table

The following is the overall schedule over 5 day training course.

Day 1 - Exploit-focused Mitigations

Start End Name Description
10:00 10:30 Introduction Introduction, overview of the courses and hands-on preparations
10:30 10:40 Memory Corruption Methods Stack Overflow
10:40 11:30 Control Flow Hijack Return Address Overwrite/SEH Overwrite/SafeSEH/RFG/Shadow Stack
11:30 13:00 Lunch Group Lunch
13:00 13:20 Memory Corruption Methods Heap Overflow/UAF/ASLR
13:20 13:50 Memory Contents Weakness RW Primitives/Object Corruption/Heap Mitigations
14:00 17:00 Hands-on Adobe Flash Exploit Code Analysis - RW Primitives

Day 2 - Post-exploit Mitigations

Start End Name Description
10:00 10:50 Control Flow Hijack Vftable Corruption/CFG
11:00 11:50 Hands-on Adobe Flash Exploit Code Analysis - CFG Bypass
12:00 13:00 Lunch Group Lunch
13:00 13:50 Payload Execution Default +X Memory/DEP/+X Shellcode Via Virtual*/ACG/ROP/CET
14:00 14:50 Hands-on Word Exploit Analysis - ROP and syscall
15:00 15:50 Memory Threats Shellcode/Process Injection/Reflective DLL Injection/Process Hollowing
16:00 16:50 Hands-on Adobe Flash Exploit Code Analysis - Multi-stage Shellcode

Day 3 - Kernel

Start End Name Description
10:00 10:50 Memory Contents Weakness kASLR/Information Leak/RW Primitives/Tactical Mitigations/Vftable Corruption/kCFG
11:00 11:50 Code Execution Kernel to Userland Code Execution/SMEP/PTE Corruption/PTE Randomization/SMAP
12:00 13:00 Lunch Group Lunch
13:00 13:50 Hands-on Advanced Kernel Threat Analysis - RW Primitivies
14:00 14:50 Hands-on Advanced Kernel Threat Analysis - RW Primitivies
15:00 15:50 Hands-on Advanced Kernel Threat Analysis - Token Swapping
16:00 16:50 Hands-on Advanced Kernel Threat Analysis - Token Swapping

Day 4 - Rootkis/Application Whitelisting

Start End Name Description
10:00 10:50 Whitelisting Rootkits and SecureBoot
11:00 11:50 Whitelisting Application Whitelisting
12:00 13:00 Lunch Group Lunch
13:00 13:50 Hands-on Windows Rootkit Analysis
14:00 14:50 Hands-on Windows Rootkit Analysis
15:00 15:50 Hands-on Windows Rootkit Analysis
16:00 16:50 Hands-on Windows Rootkit Analysis

Day 5 - VBS (Virtualization Based Security)/Container/Self-protection/SMB

Start End Name Description
10:00 10:50 Container VBS (Virtualization Based Security)/WDAG/Windows Sandbox/PPL
11:00 11:50 SMB WannaCry vs SMBv3
12:00 13:00 Lunch Group Lunch
13:00 13:50 Hands-on Debugging & Analyzing WannaCry
14:00 14:50 Hands-on Debugging & Analyzing WannaCry
15:00 15:50 Hands-on Debugging & Analyzing WannaCry
16:00 16:50 Hands-on Debugging & Analyzing WannaCry

Past Trainings

  • Private trainings are not listed here

May 2019

  • When: May/6/2019 (Mon) ~ May/10/2019 (Fri)
  • Where: Seoul, South Korea