impactpoint kernel-based-protection

26
The Kernel-based protection against physical attacks YasinSURER Sr.Security Researcher

Upload: impactpoint

Post on 16-Apr-2017

765 views

Category:

Technology


0 download

TRANSCRIPT

The Kernel-based protection

against physical attacks

YasinSURER Sr.Security Researcher

ImpactPoints Founded in 2011 to provide software security and information

security services

Headquartered in Istanbul, Turkey.

Well-known security experts in the industry.

Advanced services we provide include

• Application Security Testing

• Source Code Review

• Secure Software Development

• Incident Response & Malware Analysis Lab

• Penetration Testing

• Training

About Me

Yasin SURER

Sr. Security Researcher – ImpactPoint

...interested in high-level technical details of security

...playing with the kernel

I like Unix-based systems.

IT Security Instructor

[email protected]

Overwiev

Physical Memory Attacks and Forensics

Dumpers and Sniffer

How it works

Memory Protection against ...

Architecture-Dependent

Conclusion ?

Physical Memory Attacks and Forensics

Random Access Memory (RAM)

Includes data segment

Includes code segment

Dependent on the operating system

Live memory

Physical Memory Attacks and Forensics

Physical Memory Attacks and Forensics

Dumpers and Process Sniffers

• Running process

• Terminated process

• Passwords

• Files

• Connection data

• Adresses

• Etc.

Dumpers and Process Sniffers

Dumpers and Process Sniffers

How it works ?

Hey nigga, show me the...Oppss !

How it works ?

How it works ?

How it works ?

DEMO

Kernel-Based: Memory Protection against..

• Data Hiding

• Anti-Dumper

• Encryption...

• Out of space

• Or wipe them all out

Kernel-Based: Memory Protection against..

Kernel-Based: Memory Protection against..

Kernel-Based: Memory Protection against..

Kernel Module but reaction ?

Kernel-Based: Memory Protection against..

Architecture - Dependent

• Stored... Free Memory Pages

• Free page table

• Revise ? Offsets...

• Well, space-range ?

• Yes ! Revise the page !

• Space size implementation

Architecture - Dependent

Architecture - Dependent

Architecture - Dependent

Conclusion

Digital Forensics <> Data Recovery ?

Solutions

Commercial Solutions

? [email protected]

Thank you...

Any Questions ?