Dominik Czarnota: Linux privesc poprzez dowolny błąd odczytu/zapisu x86 MSR: studium przypadku z wyzwania CTF

youtube.com 10 miesięcy temu


In this talk we will see how we can exploit linux kernel to escalate privileges if we had an arbitrary MSR (Model circumstantial Register) read/write capability on X86 CPUs which was given to us on a "Msrable" challenge from KalmarCTF 2024 safety competition. If you have heard about "MSREXEC", this talk would show you how we would exploit a akin vulnerability, if we always find it on Linux.

This won't be specified a trivial task, since the kernel is having KASLR, SMEP, SMAP and KPTI safety mitigations, which will be explained during the talk. In the end, we will find a way to bypass SMAP (actually, without disabling it in CR4!) and usage a return-oriented-programming (ROP) exploitation method to escalate our privileges.

More: https://confidence-conference.org/