0% found this document useful (0 votes)
42 views13 pages

Hacksys Extreme Vulnerable Driver: by Ashfaq Ansari (@hacksysteam)

Download as pdf or txt
Download as pdf or txt
Download as pdf or txt
You are on page 1/ 13

HackSys Extreme Vulnerable Driver

BY ASHFAQ ANSARI (@HackSysTeam)


$whoami
• Ashfaq Ansari
• Security Consultant/Researcher @ Payatu Technologies Pvt. Ltd.

• Interests
• Vulnerability Research, Kernel Exploitation, Reverse Engineering, Exploit Development, Program
Analysis, Malware Research, Web Security & Machine Learning

• About Payatu
• A boutique security testing company specializing in Iot, Mobile, Cloud - http://www.payatu.com
• HackSys Extreme Vulnerable Driver - http://www.payatu.com/hacksys-extreme-vulnerable-driver/
• Damn Insecure and Vulnerable App for Android - http://www.payatu.com/damn-insecure-and-
vulnerable-app/
• In-house Fuzz testing Infrastructure
• Security training in Mobile and IoT exploitation – Blackhat, Brucon, Hack In Paris and Corporate trainings
What is HackSys Extreme Vulnerable
Driver?
It is intentionally vulnerable Windows Kernel Driver developed for security enthusiasts to learn
and polish their exploitation skills at Kernel level.

HackSys Extreme Vulnerable Driver caters wide range of vulnerabilities ranging from simple
Buffer Overflow to complex Use After Free, Uninitialized Variable and Pool Overflow.

This allows the researchers to explore the different exploitation techniques for every
implemented vulnerabilities.
Why is HackSys Extreme Vulnerable
Driver?
• No proper vulnerable driver to learn exploitation in Kernel mode

• Lack of working exploits

• No proper documentation

• What about source code?

• How do we mitigate the vulnerabilities?

• HackSys Extreme Vulnerable Driver or HackSys Extreme Secure Driver?


Vulnerabilities Implemented
Pool Overflow Use After Free Stack Overflow

Stack Overflow
Type Confusion Integer Overflow
GS

Arbitrary
Uninitialized Null Pointer
Memory
Variable Dereference
Overwrite

HackSys Extreme
Vulnerable Driver
Exploitation – Pool Overflow
Exploitation – Use After Free
Exploitation – Arbitrary Overwrite
Exploitation – Integer Overflow
Exploitation – Type Confusion
Exploitation – Challenge – Uninitialized
Variable
References
• Blog: http://www.payatu.com/hacksys-extreme-vulnerable-driver/
• Source: https://github.com/hacksysteam/HackSysExtremeVulnerableDriver
Thanks!
•Q&A

• Reach me
[email protected]
• @HackSysTeam
• http://hacksys.vfreaks.com/
• https://github.com/hacksysteam
• http://null.co.in/profile/411-ashfaq-ansari

You might also like