https://github.com/eigenform/perfect/blob/e5da0c693ba5d1b654...
.. and here's another example in the case of EntryBleed:
https://github.com/eigenform/perfect/blob/e5da0c693ba5d1b654...
Serious red team reports will just have a brief section like "then, we defeat KASLR with [technique]. Next..."
You could change the URL of the image, and get any file off the system to download as long as the service account had read access.
Invaluable XP, and really glad everything was behind AD authentication and internal users were trustworthy enough and operating in a network isolated context.
Things used to be distributed with .htaccess files, but only apache uses them and so that got offloaded on "blame the admin for not following documentation." Forgetting that nobody ever adds such to the docs.
2) The issue had nothing to do with the patch. It was a coincidence.
a) People avoiding the update because one part causes problems
b) A security fix they probably need is only in that update
Seems like SystemTokenInformation might be a very new addition, possibly even Windows 11 only?
Checked a kernel from November 2024 vs a current one and from I can tell, this used to be the actual mechanism the exploit worked:
Thread #1 looping
NtQueryInformationToken(TokenAccessInformation, InfoBuffer);
Thread #2 looping
Ptr = *(InfoBuffer + SidHashOffset);
if (IsValidCanonicalKernelPtr(Ptr))
done
So, it's not that this bug is a _bigger_ problem on Win11 24H2, it's that there were so many _other_ problems prior to Win11 24H2 that nobody would bother with this bug in the first place. You have nothing to worry about from being on Win11 24H2 specifically when it comes to this bug.
And:
This is an information leak bug. No danger exists in practice for anyone from this bug alone. It erodes one very weak layer to a defense-in-depth strategy. It could have been used as part of a chain of exploits to provide the attacker with information (the kernel slide) that they needed, but it just provides a meaningless memory address on its own.
It would seem this was patched in the Aug 12 security patch rollout.
If you have another exploit that will write bytes under the attacker’s control to an attacker-supplied kernel address, you will be able to do the Windows equivalent of escalate to root.
https://betanews.com/2004/02/13/windows-source-leak-traces-b...
I mean, it wasn't like the address space was all that large back then, anyhow.
How much of the core parts of the kernel do you think have been rewritten since?
Certainly it hasn't been 100% rewritten, that'd make no sense. But I'm not going to guess how much of it /has/ been rewritten because like you guessing, it'd be an uneducated one.