New attack Windows vulnerables for 8 years.
Today, I am going to release a Proof of Concept of the sandman attack using SandMan Framework. This PoC consists in elevating a user CMD shell to SYSTEM leve...
🔥 Related Trending Topics
LIVE TRENDSThis video may be related to current global trending topics. Click any trend to explore more videos about what's hot right now!
THIS VIDEO IS TRENDING!
This video is currently trending in Thailand under the topic 'สภาพอากาศ'.
About this video
Today, I am going to release a Proof of Concept of the sandman attack using SandMan Framework. This PoC consists in elevating a user CMD shell to SYSTEM level under Windows XP SP3 RC1.
Sandman Framework offers a wide range of possibilities, both offensive and defensive. Like cryptographic keys retrieving in popular encryption software (e.g. TrueCrypt, GPG), privilege
escalation (cf. PoC), login without any password, and so on.
All Windows versions are concerned, from Windows 2000 up to Windows 2008 (and possibly Windows Seven).
The following video shows how the system can be subverted in a few minutes. The following points are highlighted:
* Deactivating hibernation feature does not solve the problem.
* The sandman attack affects every Windows version, from Windows 2000 to Windows 2008, 32- and 64-bit alike.
* We can read and write everything everywhere in the physical memory (RAM).
* This attack is feasible in real life on every computer with no hardware requirements.
* The attack has no time limitation. If a computer has been hibernated one
week ago, extracting his physical memory is still possible.
This is far more powerful than other recently demonstrated attacks against physical memory, like Cold Boot and FireWire attacks.
Source : http://www.msuiche.net/
SandMan Framework : http://sandman.msuiche.net
Sandman Framework offers a wide range of possibilities, both offensive and defensive. Like cryptographic keys retrieving in popular encryption software (e.g. TrueCrypt, GPG), privilege
escalation (cf. PoC), login without any password, and so on.
All Windows versions are concerned, from Windows 2000 up to Windows 2008 (and possibly Windows Seven).
The following video shows how the system can be subverted in a few minutes. The following points are highlighted:
* Deactivating hibernation feature does not solve the problem.
* The sandman attack affects every Windows version, from Windows 2000 to Windows 2008, 32- and 64-bit alike.
* We can read and write everything everywhere in the physical memory (RAM).
* This attack is feasible in real life on every computer with no hardware requirements.
* The attack has no time limitation. If a computer has been hibernated one
week ago, extracting his physical memory is still possible.
This is far more powerful than other recently demonstrated attacks against physical memory, like Cold Boot and FireWire attacks.
Source : http://www.msuiche.net/
SandMan Framework : http://sandman.msuiche.net
Video Information
Views
5.5K
Total views since publication
Duration
7:36
Video length
Published
Mar 15, 2008
Release date