![]() |
Project Zero: Injecting Code into Windows Protected Processes using COM - Part 1 - Printable Version +- Geeks for your information (https://www.geeks.fyi) +-- Forum: News (https://www.geeks.fyi/forumdisplay.php?fid=105) +--- Forum: Privacy & Security News (https://www.geeks.fyi/forumdisplay.php?fid=107) +--- Thread: Project Zero: Injecting Code into Windows Protected Processes using COM - Part 1 (/showthread.php?tid=4162) |
Project Zero: Injecting Code into Windows Protected Processes using COM - Part 1 - harlan4096 - 16 October 18 Quote:At Recon Montreal 2018 I presented “Unknown Known DLLs and other Code Integrity Trust Violations” with Alex Ionescu. We described the implementation of Microsoft Windows’ Code Integrity mechanisms and how Microsoft implemented Protected Processes (PP). As part of that I demonstrated various ways of bypassing Protected Process Light (PPL), some requiring administrator privileges, others not. |