03 июля 2024
1 минута

Inside of Windows: How a Double-Fetch Vulnerability Leads to SYSTEM Access

24H2 NT Kernel Exploit [POC]

📌Target: NT kernel in Windows 11 24H2 Insider Preview.

📌Vulnerabilities: Multiple kernel vulnerabilities in ntoskrnl.exe.

Exploit Technique:

📌Uses process token swap to gain NT AUTHORITY\SYSTEM privileges.

📌Walks the PsActiveProcessHead list to find a privileged process and its token.

📌Replaces the token of the exploit process with the privileged token.

📌Spawns a new command prompt with SYSTEM privileges.

Bypassing KASLR:

📌Uses side-channel attacks to locate the kernel base address.

📌Highlights weaknesses in the new KASLR implementation.

Components:

📌teb_nt_poc.c: The main exploit code.

📌prefetch_asm.asm and prefetch_leak.h: Used for side-channel attacks to bypass kernel ASLR.

📌find_nt_offsets.h and find_nt_offsets.c: Finds non-exported globals in NT using Capstone.

📌ntos.h: Contains miscellaneous non-public structs and functions related to NT.


CVE-2024-21345 [POC]

📌Vulnerability: Proof-of-Concept (PoC) for CVE-2024-21345.

📌Target: Specific vulnerability in a software component

Exploit Details:

📌The vulnerability involves a double-fetch issue in NtQueryInformationThread, leading to an arbitrary write.

📌Exploitation can result in high integrity and confidentiality impacts, with availability also rated as high.


CVE-2024-26218 [POC]

📌Vulnerability: Proof-of-Concept (PoC) for CVE-2024-26218.

📌Target: Specific vulnerability in a software component.

Exploit Details:

📌The vulnerability allows attackers to elevate their privileges to SYSTEM level, which can lead to full control over the affected system.


Бесплатный