ROP is DEAD! Kernel Driver Binary Exploitation

Поділитися
Вставка
  • Опубліковано 16 жов 2024

КОМЕНТАРІ • 51

  • @RealCyberCrime
    @RealCyberCrime Рік тому +28

    RIP ROP. That kinda has a nice ring to it

    • @killerskincanoe
      @killerskincanoe Рік тому +1

      I said this out loud the second I read the title

  • @ConnorFieldOSRS
    @ConnorFieldOSRS Рік тому +18

    This one feels so much more natural than the 1st vPro video.
    Keep up the amazing work John!

    • @charlesmarseille123
      @charlesmarseille123 Рік тому +1

      yes, great job indeed! Although, personnally, I think you started to "shout" a bit more than before, compared to your ctf and koth videos. You and your content are interesting, no need for extra emphasis :)
      Thanks a lot for all you do!

    • @charlesmarseille123
      @charlesmarseille123 Рік тому

      thinking back about this, I guess you must do what you must considering the sponsor, and you must put bread on that table. Keep it up, gold content.

  • @lav-m4a138
    @lav-m4a138 Рік тому +4

    The most convincing promotion the world ever seen!
    Cool vid, John!

  • @somename8159
    @somename8159 Рік тому +3

    Nice video!!!
    I would love to see more videos about binary explotation (or other more advanced topics) in the future.

  • @pippolab2275
    @pippolab2275 Рік тому +4

    Just a quick note that Apple has that mitigation (PAC) since 4/5 years at least, but they're still pwning it (also if it's one of the most difficult target)

  • @TheGoodChap
    @TheGoodChap 11 місяців тому

    I remeber like 7 years ago i finally found out that the million buffer overflow explanations all over the internet dont explain DEP so i found out about ROP and sucessfully wrote a ROP exploit for a program i actually used regularly. Was very proud of that

  • @dark_sunset
    @dark_sunset Рік тому +1

    im brand new to programming although ive wanted to learn for many years, and i barely understand any of this but it's fun to watch anyway. thanks john!

  • @atomicatalyst
    @atomicatalyst Рік тому +4

    How does this stand in terms of overhead? Are program execution times considerably slower?

  • @Foiliagegaming
    @Foiliagegaming Рік тому +2

    I am to far behind for this video. Still find it interesting though. Looking forward to learning more to get to this point.

  • @hackvlix
    @hackvlix Рік тому +3

    Ok, and next a video that explains how CET actually works? 🤗

  • @Foiliagegaming
    @Foiliagegaming Рік тому +3

    It would be interesting to see if AMD or any other ARM CPUs are able to have something similar. Is there a way to look into the part that is actually blocking the ROP?

  • @BillyHudson1
    @BillyHudson1 Рік тому

    Wow. That is quite something. Nice job from Intel.

  • @phoenix_fire_stone
    @phoenix_fire_stone 6 місяців тому

    hey john is it still worth the time learning ROP today? I really wanted to learn it but if it is not relevant anymore i will not learn it. how widespread are these intel systems?

  • @DarkFaken
    @DarkFaken Рік тому +2

    Love your work John ❤️

  • @mb00001
    @mb00001 Рік тому +2

    I have been wondering lately whether or not we will always be able to come up with automatic mitigations, and tbh unless we can get true ai that actually understands what is happening to the system and whether or not said actions are legit then i honestly think hackers will eventually win essentially it boils down to the fact that are so many more ways to misuse a system

  • @yurilsaps
    @yurilsaps Рік тому +2

    Really loved, but is hard to understand

  • @follower
    @follower Рік тому +1

    ROP will never be dead.

  • @squid13579
    @squid13579 Рік тому +2

    Vpro currently conquering.. rop 🥀⚰️

  • @skullandpwnz6053
    @skullandpwnz6053 Рік тому +3

    This Intel video makes me want to buy intel , I watched 100s of Linus videos spewing intel ads and never wanted to but it. You got me sold.

  • @MADhatter_AIM
    @MADhatter_AIM Рік тому +5

    Does that mean that servers running the AMD "Threadripper" or "Epyc"-architecture, are still vulnerable for ROP instructions ?

    • @sablanex
      @sablanex Рік тому +1

      Probably unless they have something similar

  • @_CryptoCat
    @_CryptoCat Рік тому +4

    let's goooo 💜

  • @farzadmf
    @farzadmf Рік тому +7

    I think it would be nice in general to also talk about Apple M chips, which people say that's the best thing that's happened to humankind!
    I'm super curious to know if, security wise, it lives up to the hype

  • @erin1569
    @erin1569 Рік тому +6

    Seeing intel sponsoring the videos is weird and stinks
    When it comes down to corporations, I think I'll pick the old poison I'm familiar with over the one trying a new trick to look nice

  • @danielsonuk7171
    @danielsonuk7171 Рік тому

    I don't comment. but John you do so well. I will comment here & now/ well done

  • @Toolookanu
    @Toolookanu Рік тому

    you got a big ol' brain John. Great stuff.

  • @Nunya58294
    @Nunya58294 Рік тому

    Damn it... And I just started learning how to ROP....

  • @luketurner314
    @luketurner314 Рік тому +4

    12:08 If CET prevents modifications to the stack by comparing it to the shadow stack, how would it tell the difference if the program itself is trying to make those modifications? would CET prevent the program itself from modifying its own stack? or would it identify that the instruction came from the program's own set of instructions/code space? if so, how would it tell that the program initiated the instruction and not ROP (ROP using the program's own instructions to modify its own stack)? or if the program was coerced in some other way?
    My point is, how can Intel infer what the programmer intended without telepathy?! Parse the code maybe, but that assumes the programmer is competent. Maybe they are, maybe they're not. It's not guaranteed. It also assumes the programmer is not malicious.
    I suspect the answers to these questions is the magic sauce that makes it work and they don't want threat actors to know. As was stated in the video, "security is a cat and mouse game" (0:59).

    • @nordgaren2358
      @nordgaren2358 Рік тому

      Most programs don't modify the return pointer, which is what I imagine the shadow stack would be comparing.
      I have seen some programs use a modified return pointer, but I don't think it uses the dame return pointer that's on the stack.
      Would be interesting though. I know elden ring and dark souls 3 use this kind of obfuscation. I'm sure they still run fine on this, though?

    • @nordgaren2358
      @nordgaren2358 Рік тому

      I would also take into consideration that the shadow stack knows what's already on the stack, and can detect that a buffer was overflown after a call is executed, since stuff on the stack would be changed, when it shouldn't have (I.E. a call to memcpy to copy over some data to a buffer, and after that return, the stack for the current frame, has changed.

  • @xscorp382
    @xscorp382 Рік тому

    Every new feature brings in new flaws. Soon, You will hear researchers finding out ways to push modified return address in the shadow stack. Not sure tho

  • @_AN203
    @_AN203 Рік тому

    0:57
    Aka change the exec flow...

  • @suchtberater
    @suchtberater Рік тому +1

    bro youtube vanced just died ffs

  • @rationalbushcraft
    @rationalbushcraft Рік тому +5

    I have mixed feelings about this. Yes it is great for security. Makes pen testing harder.

    • @infidon9229
      @infidon9229 Рік тому +2

      bruh...

    • @aidancollins1591
      @aidancollins1591 Рік тому +7

      Lol, that's like a weapons maker having mixed feelings about wars ending.

    • @maze2512
      @maze2512 Рік тому +1

      Not applicable for pen testing. This more for exploit dev. Plus there are CET bypass using COOP on c++. Overall your goal as a ethical hacker (offesive/red team) is to work your self out of a job.

    • @aidancollins1591
      @aidancollins1591 Рік тому +1

      @@maze2512 Precisely, and unless we achieve the singularity in AI (I'm skeptical that it is possible) or the nuclear apocalypse happens, our job will not be gone. It will get more complicated and specialized, but hackers will always exist.

  • @troopsleader4066
    @troopsleader4066 Рік тому +4

    plzz make a video on reverse shell using pdf

  • @pseudounknow5559
    @pseudounknow5559 Рік тому

    RIP ROP but nevetheless I nerver understood it it's too hard xD

  • @gregoryjones9829
    @gregoryjones9829 Рік тому

    Bebopping around

  • @KeithMakank3
    @KeithMakank3 Рік тому +1

    We all know its pronounced IO"Cottle" not IOCTL

  • @_neovek
    @_neovek Рік тому +2

    Your videos are becoming too much advanced... Please post more of the easier tips and techniques

  • @yatra2heart
    @yatra2heart Рік тому

    Is there any coupon available for tryhackme annual subscription