ROP is DEAD! Kernel Driver Binary Exploitation

แชร์
ฝัง
  • เผยแพร่เมื่อ 28 ส.ค. 2024

ความคิดเห็น • 51

  • @RealCyberCrime
    @RealCyberCrime ปีที่แล้ว +28

    RIP ROP. That kinda has a nice ring to it

    • @killerskincanoe
      @killerskincanoe ปีที่แล้ว +1

      I said this out loud the second I read the title

  • @ConnorFieldOSRS
    @ConnorFieldOSRS ปีที่แล้ว +18

    This one feels so much more natural than the 1st vPro video.
    Keep up the amazing work John!

    • @charlesmarseille123
      @charlesmarseille123 ปีที่แล้ว +1

      yes, great job indeed! Although, personnally, I think you started to "shout" a bit more than before, compared to your ctf and koth videos. You and your content are interesting, no need for extra emphasis :)
      Thanks a lot for all you do!

    • @charlesmarseille123
      @charlesmarseille123 ปีที่แล้ว

      thinking back about this, I guess you must do what you must considering the sponsor, and you must put bread on that table. Keep it up, gold content.

  • @lav-m4a138
    @lav-m4a138 ปีที่แล้ว +4

    The most convincing promotion the world ever seen!
    Cool vid, John!

  • @somename8159
    @somename8159 ปีที่แล้ว +3

    Nice video!!!
    I would love to see more videos about binary explotation (or other more advanced topics) in the future.

  • @pippolab2275
    @pippolab2275 ปีที่แล้ว +4

    Just a quick note that Apple has that mitigation (PAC) since 4/5 years at least, but they're still pwning it (also if it's one of the most difficult target)

  • @atomicatalyst
    @atomicatalyst ปีที่แล้ว +4

    How does this stand in terms of overhead? Are program execution times considerably slower?

  • @hackvlix
    @hackvlix ปีที่แล้ว +3

    Ok, and next a video that explains how CET actually works? 🤗

  • @dark_sunset
    @dark_sunset ปีที่แล้ว +1

    im brand new to programming although ive wanted to learn for many years, and i barely understand any of this but it's fun to watch anyway. thanks john!

  • @Foiliagegaming
    @Foiliagegaming ปีที่แล้ว +2

    I am to far behind for this video. Still find it interesting though. Looking forward to learning more to get to this point.

  • @erin1569
    @erin1569 ปีที่แล้ว +5

    Seeing intel sponsoring the videos is weird and stinks
    When it comes down to corporations, I think I'll pick the old poison I'm familiar with over the one trying a new trick to look nice

  • @MADhatter_AIM
    @MADhatter_AIM ปีที่แล้ว +5

    Does that mean that servers running the AMD "Threadripper" or "Epyc"-architecture, are still vulnerable for ROP instructions ?

    • @sablanex
      @sablanex ปีที่แล้ว +1

      Probably unless they have something similar

  • @TheGoodChap
    @TheGoodChap 10 หลายเดือนก่อน

    I remeber like 7 years ago i finally found out that the million buffer overflow explanations all over the internet dont explain DEP so i found out about ROP and sucessfully wrote a ROP exploit for a program i actually used regularly. Was very proud of that

  • @luketurner314
    @luketurner314 ปีที่แล้ว +4

    12:08 If CET prevents modifications to the stack by comparing it to the shadow stack, how would it tell the difference if the program itself is trying to make those modifications? would CET prevent the program itself from modifying its own stack? or would it identify that the instruction came from the program's own set of instructions/code space? if so, how would it tell that the program initiated the instruction and not ROP (ROP using the program's own instructions to modify its own stack)? or if the program was coerced in some other way?
    My point is, how can Intel infer what the programmer intended without telepathy?! Parse the code maybe, but that assumes the programmer is competent. Maybe they are, maybe they're not. It's not guaranteed. It also assumes the programmer is not malicious.
    I suspect the answers to these questions is the magic sauce that makes it work and they don't want threat actors to know. As was stated in the video, "security is a cat and mouse game" (0:59).

    • @nordgaren2358
      @nordgaren2358 ปีที่แล้ว

      Most programs don't modify the return pointer, which is what I imagine the shadow stack would be comparing.
      I have seen some programs use a modified return pointer, but I don't think it uses the dame return pointer that's on the stack.
      Would be interesting though. I know elden ring and dark souls 3 use this kind of obfuscation. I'm sure they still run fine on this, though?

    • @nordgaren2358
      @nordgaren2358 ปีที่แล้ว

      I would also take into consideration that the shadow stack knows what's already on the stack, and can detect that a buffer was overflown after a call is executed, since stuff on the stack would be changed, when it shouldn't have (I.E. a call to memcpy to copy over some data to a buffer, and after that return, the stack for the current frame, has changed.

  • @DarkFaken
    @DarkFaken ปีที่แล้ว +2

    Love your work John ❤️

  • @yurilsaps
    @yurilsaps ปีที่แล้ว +2

    Really loved, but is hard to understand

  • @_CryptoCat
    @_CryptoCat ปีที่แล้ว +4

    let's goooo 💜

  • @Foiliagegaming
    @Foiliagegaming ปีที่แล้ว +3

    It would be interesting to see if AMD or any other ARM CPUs are able to have something similar. Is there a way to look into the part that is actually blocking the ROP?

  • @farzadmf
    @farzadmf ปีที่แล้ว +7

    I think it would be nice in general to also talk about Apple M chips, which people say that's the best thing that's happened to humankind!
    I'm super curious to know if, security wise, it lives up to the hype

  • @mb00001
    @mb00001 ปีที่แล้ว +2

    I have been wondering lately whether or not we will always be able to come up with automatic mitigations, and tbh unless we can get true ai that actually understands what is happening to the system and whether or not said actions are legit then i honestly think hackers will eventually win essentially it boils down to the fact that are so many more ways to misuse a system

  • @skullandpwnz6053
    @skullandpwnz6053 ปีที่แล้ว +3

    This Intel video makes me want to buy intel , I watched 100s of Linus videos spewing intel ads and never wanted to but it. You got me sold.

  • @BillyHudson1
    @BillyHudson1 ปีที่แล้ว

    Wow. That is quite something. Nice job from Intel.

  • @user-kn8tp7jo3c
    @user-kn8tp7jo3c 4 หลายเดือนก่อน

    hey john is it still worth the time learning ROP today? I really wanted to learn it but if it is not relevant anymore i will not learn it. how widespread are these intel systems?

  • @squid13579
    @squid13579 ปีที่แล้ว +2

    Vpro currently conquering.. rop 🥀⚰️

  • @danielsonuk7171
    @danielsonuk7171 ปีที่แล้ว

    I don't comment. but John you do so well. I will comment here & now/ well done

  • @AbacateSexy
    @AbacateSexy ปีที่แล้ว

    John, could you provide the final script for the windows 7 BOF exploit?
    Cheers, great video

  • @xscorp382
    @xscorp382 ปีที่แล้ว

    Every new feature brings in new flaws. Soon, You will hear researchers finding out ways to push modified return address in the shadow stack. Not sure tho

  • @Toolookanu
    @Toolookanu ปีที่แล้ว

    you got a big ol' brain John. Great stuff.

  • @troopsleader4066
    @troopsleader4066 ปีที่แล้ว +4

    plzz make a video on reverse shell using pdf

  • @_AN203
    @_AN203 ปีที่แล้ว

    0:57
    Aka change the exec flow...

  • @follower
    @follower 10 หลายเดือนก่อน

    ROP will never be dead.

  • @rationalbushcraft
    @rationalbushcraft ปีที่แล้ว +5

    I have mixed feelings about this. Yes it is great for security. Makes pen testing harder.

    • @infidon9229
      @infidon9229 ปีที่แล้ว +2

      bruh...

    • @aidancollins1591
      @aidancollins1591 ปีที่แล้ว +7

      Lol, that's like a weapons maker having mixed feelings about wars ending.

    • @maze2512
      @maze2512 ปีที่แล้ว +1

      Not applicable for pen testing. This more for exploit dev. Plus there are CET bypass using COOP on c++. Overall your goal as a ethical hacker (offesive/red team) is to work your self out of a job.

    • @aidancollins1591
      @aidancollins1591 ปีที่แล้ว +1

      @@maze2512 Precisely, and unless we achieve the singularity in AI (I'm skeptical that it is possible) or the nuclear apocalypse happens, our job will not be gone. It will get more complicated and specialized, but hackers will always exist.

  • @suchtberater
    @suchtberater ปีที่แล้ว +1

    bro youtube vanced just died ffs

  • @pseudounknow5559
    @pseudounknow5559 ปีที่แล้ว

    RIP ROP but nevetheless I nerver understood it it's too hard xD

  • @gregoryjones9829
    @gregoryjones9829 ปีที่แล้ว

    Bebopping around

  • @KeithMakank3
    @KeithMakank3 ปีที่แล้ว +1

    We all know its pronounced IO"Cottle" not IOCTL

    • @hackvlix
      @hackvlix ปีที่แล้ว

      Boo! No!

  • @_neovek
    @_neovek ปีที่แล้ว +2

    Your videos are becoming too much advanced... Please post more of the easier tips and techniques

  • @Nunya58294
    @Nunya58294 ปีที่แล้ว

    Damn it... And I just started learning how to ROP....

  • @yatra2heart
    @yatra2heart ปีที่แล้ว

    Is there any coupon available for tryhackme annual subscription