Presented at
DEF CON 31 (2023),
Aug. 11, 2023, 10 a.m.
(45 minutes).
The use of containers became an integral part of any resource-efficient and secure environment. Starting from Windows Server 2016, Microsoft released its version of this solution called Windows Containers, which offers either a process or Hyper-V isolation modes.
In both cases, an efficient file system separation should be provided. On one hand, each container should be able to access system files and write changes that will not affect the host. On the other, copying the entire main volume on each container launch will be storage-inefficient and not practical.
In this presentation, we will cover the basics of windows containers, break down its file system isolation framework, reverse-engineer its main mini-filter driver, and see how it can be utilized and manipulated by an actor to bypass EDR products in multiple domains. Eventually, we will provide an open-source tool based on these findings.
This technology caught my attention for several reasons:
* Containers and virtualization solutions are everywhere, and their internal workings are not well documented.
* Actors often search for ways to escape containers. The idea of intentionally entering into one in order to evade security products has yet to be explored.
* This framework doesn't require any prerequisites and comes as default in every modern Windows image! (the part which we will abuse, at least).
REFERENCES:
* https://googleprojectzero.blogspot.com/2021/04/who-contains-containers.html
* https://unit42.paloaltonetworks.com/what-i-learned-from-reverse-engineering-windows-containers/
* https://research.checkpoint.com/2021/playing-in-the-windows-sandbox/
* https://www.amazon.com/Windows-Kernel-Programming-Pavel-Yosifovich/dp/1977593372
* https://learn.microsoft.com/en-us/virtualization/windowscontainers/about/
* https://habr.com/en/company/acronis/blog/536018/
Presenters:
-
Daniel Avinoam
- Security Researcher at Deep Instinct
As a security researcher at Deep Instinct, Daniel develops and researches new defense capabilities.After serving for several years in the advanced technological cyber unit under the Israeli Air Force, Daniel has experience in the defensive side of cyber warfare, including forensics, incident response, development, reverse engineering, and research.
Links:
Similar Presentations: