[EN] Analyzing CVE-2018-8453 : An interesting tale of UAF and Double Free in Windows Kernel
<p><a id="khokhar"></a></p>
<p>In this talk, we discuss intricate details of exploitation of CVE-2018-8453, a vulnerability in win32.sys Microsoft Windows driver. It which was reported by Kaspersky Lab as it was being used in highly targeted attacks.</p>
<p>In this talk, we discuss its intricate details, how to reproduce it and how to exploit the vulnerability on different versions of Windows as the vulnerable code is present in Windows 7, 8.1 and 10 as well (though we will be demonstrating it on Windows 7 and Windows 10 only).</p>
<p>Key takeaways - After attending the talk, the attendees will have knowledge about: 1. How to do binary diffing 2. Locating vulnerable code from description of vulnerability 3. Exploiting Use After Free vulnerability in Windows Kernel 4. Exploiting double free vulnerability in Windows Kernel 5. Various challenges in writing kernel exploits (mitigations and bypasses) 6. Performing Heap Spray and Data Only Attacks (on different Windows versions)</p>
<h4>About Himanshu Khokhar</h4>
<p>Himanshu Khokhar is a Vulnerability Researcher at Pyramid Cyber Security and Forensics Pvt. Ltd. He enjoys looking for bugs in binaries and exploiting them and is currently doing research on Windows Kernel exploitation. Besides vulnerability research, he also enjoys malware analysis and travelling in his free time.</p>
<h4>About Shivam Trivedi</h4>