Presented at
REcon 2011,
July 8, 2011, 4 p.m.
(60 minutes).
This presentation is about a remote kernel debugger leveraging the hardware virtualization facilities provided by modern processors. The hypervisor is loaded "on the fly" with DMA requests and allow to debug the target without rebooting. The client part leverages the metasm framework.
This presentation is about a remote kernel debugger leveraging the hardware
virtualization facilities provided by modern processors. This presentation
will demonstrate how to load a hypervisor in the kernel of a Windows 7 x64
operating system with DMA requests thus bypassing code signing checks and
integrity verification (PatchGuard protection). The VMM (hypervisor) is
implemented using a "Blue Pill" approach that is to say we are virtualizing the
operating system "on the fly". The debugger leverages a good part of the
features provided by the metasm framework (http://metasm.cr0.org).
We will also discuss the pros and cons of using virtualization for debugging
purposes.
Presenters:
Links:
Similar Presentations: