http://www.codemachine.com/courses.html#kerdbg

Windows Kernel Internals for Security Researchers

This course takes a deep dive into the internals of the Windows kernel from a security perspective. Attendees learn about behind the scenes working of various components of the windows kernel with emphasis on internal algorithms, data structures and debugger usage. Every topic in this course is accompanied by hands-on labs that involve extensive use of the kernel debugger (WinDBG/KD) with emphasis on interpreting the debugger output and using this information to understand the state and health of the system. Attendees also analyze pre-captured memory dumps to identify kernel rootkits and dissect rootkit behavior.

Learning Objectives

  • Understand the major components in the Windows Kernel and the functionality they provide.
  • Understand the key principles behind the design and implementation of the Windows kernel.
  • Understand the internal workings of the kernel and how to peek into it using the debugger.
  • Be able to investigate system data structures using kernel debugger extension commands.
  • Be able to interpret the output of debugger commands and correlate them to the state of the system.
  • Be able to navigate between different data structures in the kernel, using debugger commands.
  • Be able to locate indicators of compromise while hunting for kernel mode malware.
  • Understand how kernel mode rootkits interact with the system.

Prerequisites

Attendees must have a solid understanding of operating system concepts and have a working knowledge of Windows. This course does not require you to have any programming knowledge.

Topics

Day 1
Architectural Overview: Privilege rings, HAL, kernel, executive, device drivers, Win32k.sys, NTDLL, system process, user and kernel threads.            
Hardware Support: CPU registers, segment registers, global descriptor table (GDT), interrupt descriptor table (IDT), task state segment (TSS), call gates, local descriptor table (LDT), model specific registers (MSR).            
Day 2
Critical Data Structures: Process and thread data structures (EPROCESS, ETHREAD, KPROCESS, KTHREAD), KSHARED_USER_DATA, kernel process and module list, processor control region (KPCR).    
System Mechanisms: Interrupt request levels (IRQL), interrupts, traps, system calls, service descriptor tables, Native API calls (Zw vs Nt), read/write probes, exception handling, kernel-user callbacks.        
Day 3
Kernel Execution Environment: Interrupt service routines (ISR), deferred procedure calls (DPC), asynchronous procedure calls (APC), system threads, work items, worker threads, timers.    
Memory Management: Kernel virtual address space, page table entries (PTE), virtual address descriptors (VAD), page frame number (PFN) database, kernel mode thread stacks, pools, memory mapping and memory descriptor lists (MDL).    
Day 4
Objects and Handles: Object manager, object header, object types and procedures, object layout, object security checks, handle tables, handle table entries, kernel handles, object reference counting.    
Windowing Subsystem: CSRSS, Win32K.sys, DirectX, GUI threads, Win32K.sys data structures, session space, session pool, keyboard and mouse input.    
Day 5
Device Drivers: Driver architecture, I/O manager data structures (driver object, device object, file object, symbolic link), I/O requests (IRP and I/O stack location), I/O processing, IOCTL requests, data buffering mechanisms.    
Kernel Security Mitigations: Kernel mode code signing (KMCS), kernel patch protection (PatchGuard), KASLR, supervisor mode execution prevention (SMEP), non-executable (NX) pools, safe pool unlinking, pool integrity checks, NULL page allocation protection, GS cookie, integrity level restrictions.    

Windows Kernel and Filter Driver Development

Most security software on Windows run in kernel mode. This course starts with the basics of kernel mode software development and debugging and then progressively dives into the APIs, filtering mechanisms and advanced programming techniques required to implement kernel mode security software. Every topic in the course is accompanied by hands-on labs that involve extensive coding and debugging of kernel mode software to understand the programming model, the interfaces (APIs), their use cases and common pitfalls. This is a security focused course and does NOT cover development of drivers for hardware devices like PCI and USB, Bluetooth. It does NOT cover Kernel Mode Driver Framework (KMDF).

Course Objectives

  • Get a jump start into Windows kernel mode software development and debugging.
  • Be able to perform common programming tasks required by kernel mode drivers.
  • Understand the intricacies of kernel mode software development.
  • Be able to use different filtering mechanisms provided by Windows to intercept and modify operations in the system.
  • Be able to use kernel mode APIs to develop reasonably complex security functionality.
  • Be able to use the debugger effectively to perform live debugging of kernel mode drivers.
  • Be able to use tools other than the debugger to debug issues with kernel mode software.
  • Understand how kernel mode rootkits and commercial anti-malware implement their functionality.

Prerequisites

Attendees must be proficient in C/C++ programming. In addition, attendees are expected to have good working knowledge of the windows kernel. CodeMachine's Windows Internals for Security Researchers course provides the Windows kernel knowledge required to attend this course.

Topics

Day 1
Driver Development Environment: Driver development with Visual Studio, Windows driver kit (WDK), WDK headers and libraries, WDK sample code, driver installation and updating, VM debug environment, debug prints    
Kernel Debugging: Live debugging with WinDBG/KD, breakpoint techniques, execution control, runtime patching, driver code analysis (PREfast), run-time verification (Driver Verifier), kernel tracing    
Day 2
Driver Programming Basics: Driver entry points, IRP processing, IOCTL requests, interfacing with user-mode applications, application-driver data transfers (buffering methods), kernel memory allocation (pools and lookaside lists), Unicode string handling.    
Asynchronous Execution: Interrupt request levels (IRQL), DPC routines, kernel timers, worker routines and work items, custom driver threads, APC routines, code injection, queuing and kernel linked list manipulation.    
Day 3
Locking & Serialization: Kernel mode synchronization, mutexes, ERESOURCES, critical and guarded regions, locking granularity, interlocked operations, events, spin locks and queued spin locks.    
Advanced Driver Programming: Locking and mapping memory, building custom I/O requests, object attributes, object reference counting, rundown protection, executive callbacks and capturing stack back-traces.    
Day 4
IRP Filter Drivers: Driver layering, device attachment and detachment, pre-filtering and post-filtering, I/O request processing, filter and control device objects.    
Kernel Callbacks: Image load notifications, process and thread creation and deletion callbacks, object callbacks, image verification callbacks, session callbacks, PnP and power callbacks.    
Day 5
Complex Filtering: Registry callbacks, file system mini-filter drivers (FltMgr filters), early load anti-malware (ELAM) drivers.    
Network Filters: Network stack architecture, kernel network interfaces, packet data structure (NBL, NB, MDL) manipulation, Windows filtering platform (WFP) drivers, NDIS lightweight filters (LWF) drivers.    

Windows Kernel Exploitation and Rootkits

To achieve maximum stealth and obtain unabated access to the system, rootkits execute in kernel mode. This course focuses on the kernel interfaces (APIs), data structures and mechanisms that are exploited by rootkits to achieve their goals at every stage of their execution. Kernel security enhancements that have been progressively added from Windows 7 to the latest version of Windows are discussed along with some circumvention techniques. Every topic in this course is accompanied by hands-on labs where attendees get to implement key components of a rootkit and test them on 64-bit Windows systems to reinforce their understanding of the theory. By learning how rootkits actually work, attendees are able to detect and defend against them.

Course Objectives

  • Understand vulnerabilities in the Windows kernel and device drivers.
  • Be able to write and modify kernel mode exploits.
  • Understand the security enhancements that have been added to recent versions of Windows.
  • Be able to bypass some of the security mitigations in recent versions of Windows.
  • Understand the post-exploitation steps performed by kernel mode rootkits.
  • Understand the techniques used by popular real world rootkits.
  • Understand how rootkits hide their presence in the system.
  • Understand how rootkits communicate with command and control (C&C) servers.
  • Be able to identify malicious behavior and defend against rootkits.

Prerequisites

Attendees must be proficient in C/C++ programming. In addition, attendees are expected to have good understanding of Windows kernel internals and APIs. CodeMachine's Windows Internals for Security Researchers and Windows Kernel and Filter Driver Development courses provide the Windows kernel knowledge required to attend this course.

Topics

Day 1
Kernel Architecture Overview: Kernel components, x86 and x64 differences, kernel virtual address space, kernel pools, object layout, tokens and privileges, Native APIs, system calls.    
Kernel Vulnerabilities: Types of kernel vulnerabilities, arbitrary memory writes, race conditions, type confusion, pool overflows and stack overflows.    
Day 2
Hooking Techniques: Types of hooking, code flow subversion, inline hooking, dispatch table hooking, import address table (IAT) hooks, kernel callbacks and filtering mechanisms, hook detection.    
Kernel Security Mitigations: Kernel mode code signing (KMCS), kernel patch protection (PatchGuard), KASLR, supervisor mode execution prevention (SMEP), non-executable (NX) pools, safe pool unlinking, pool integrity checks, NULL page allocation protection, GS cookie, integrity level restrictions.    
Day 3
Driver Exploitation: Version verification, privilege escalation, vulnerable functions, user controlled input, IOCTL fuzzing, pool grooming, weaponizing exploits.    
Kernel Security Bypass: Stack pivots, ROP gadgets, address leaks, SMEP bypass, kernel execution vectors, big pool manipulation.    
Day 4
Kernel Programming Techniques: Process attach and detach, code injection, bypassing memory protection, kernel mode shell coding techniques, execution affinity, kernel crypto, persistence mechanisms.    
Stealth Behavior: Kernel structure manipulation, rootkit self-defense, anti-debugging techniques, anti-VM techniques, stealth user mode communication, stealth filtering, detection bypass.    
Day 5
Covert Communications: NDIS driver types, NDIS internal data structures, net buffer lists (NBL), net buffers (NB), intermediate drivers (NDIS IM), lightweight filters (NDIS LWF), NDIS hooking, host firewall bypass.    
Detection Tools & Case Studies: Volatility framework, rootkit detectors, endpoint security products, Rustock, TDSS/TDL4, ZeroAccess Carberp, Regin.    

Windows Kernel Debugging and Memory Dump Analysis

This course is targeted at kernel software developers, support engineers and software QA engineers. It starts with the building blocks required to do effective kernel debugging like kernel internals concepts, key data structures used by drivers and debugger commands to examine the state and health of the system. It then dives into various techniques and strategies that can be applied to perform triaging, fault isolation, analysis and root causing of crashes and hangs caused by kernel mode drivers. Every topic in the course is accompanied by hands-on labs that involve extensive usage of the Debugging Tools for Windows (WinDBG) as well as other tools that ship with the WDK. These hands-on labs provide attendees with real life experience of debugging kernel mode issues.

Course Objectives

  • Understand the internal workings of the kernel and how to peer into it using the debugger.
  • Understand the kernel data structures that are used by drivers and how to navigate between them.
  • Be able to use the kernel debugger commands and extensions and interpret debugger output.
  • Be able to apply the knowledge of kernel internals and debugger commands to identify. symptoms of system failure/instability, perform bug triaging and perform fault isolation.
  • Be able to analyze and root cause problems down to a code change in the driver.
  • Be able to debug hard-to-reproduce hangs and crashes.

Prerequisites

Attendees must be able to read C/C++ source code. In addition, attendees are expected to have basic working level knowledge of WinDBG and should be familiar with the Windows device driver (WDK) APIs.

Topics

Day 1
Kernel Architecture Overview: Kernel, executive, HAL, drivers, processes and threads, system & system idle process, process and thread data structures, system calls, processor control region (KPCR).    
Kernel Execution Environment: Interrupt request levels (IRQL), interrupt service routines (ISR), deferred procedure calls (DPC), asynchronous procedure calls (APC), system worker threads, custom driver threads.    
Day 2
Kernel Synchronization: Dispatcher objects, interlocked operations, mutexes, critical and guarded regions, executive resources, spin locks.     
Memory Management: Kernel VAS layout, page table entries (PTEs), page frame number (PFN) database, system sache, kernel mode stacks, kernel pools, memory descriptor lists (MDL), memory mapping.    
Day 3
I/O Management: Hardware device tree, driver types (bus, function, filter), device types (FDO, PDO, FiDO), filter drivers, driver architecture, driver entry points, I/O request flow, IRPs, I/O stack locations, IRP processing, IRP completion, IRP data buffering.    
Crash Dump Analysis: System bugchecks, crash dump generation, types of bugchecks, automated analysis, module identification, context switching, hardware failures, examining system state.    
Day 4
Calling Convention and Call Stacks: Kernel stack layout, calling convention, x64 call stacks, kernel stack overflow, debugging double faults, debugging corrupt stacks.    
Debugging Deadlocks and Hangs: Causes of hangs, classic deadlock, deadlock debugging, driver power state failure, I/O request stalls, pool depletion, SysPTE depletion.    
Day 5
Advanced Analysis Techniques: Debugging strategies, root cause analysis, stack patterns, invalid memory access, pool corruption patterns, structure corruption, mapping data structures to modules, code flow analysis.    
Debugging Tools: Driver verifier, special pool, unloaded modules, run time stack capture, Gflags, object reference tracking, pool tag breakpoints, PTE tracking, checked builds.    

Delivery

All of our courses are available for private on-site delivery, worldwide. Each attendee must bring their own system to perform the hands-on labs. System setup instructions are here. We are happy to customize course contents based on your unique needs.  Please contact us for course pricing information.

Windows Kernel Security Training Courses的更多相关文章

  1. [微软官网]One Windows Kernel

    One Windows Kernel https://techcommunity.microsoft.com/t5/Windows-Kernel-Internals/One-Windows-Kerne ...

  2. Windows Kernel Way 扉言

    七年寒窗,但求一道. 笔者在学习windows/linux以及各类编程语言.框架之初因摸不到门路而磕磕绊绊,因寻不到明师而步履蹒跚,或不知缘从何起,或不知路在何处,只能尝试.回溯.重来.反反复复,竟也 ...

  3. Windows kernel pool 初探(2014.12)

    Windows kernel pool 1. 简介 Kernel pool类似于Windows用户层所使用Heap,其为内核组件提供系统资源.在系统初始化的时候,内存管理模块就创建了pool. 严格的 ...

  4. 我与 windows kernel 的一段时光

    写在前面 本科毕业设计是实现一个基于 windows 的透明加密过滤系统.由此对 windows kernel development,尤其是 file system 进行过较为深入的探索.对于防终止 ...

  5. Digest of Overview of Linux Kernel Security Features

    Linux kernel Security: I. DAC: Discretionary Access Control, the core security model of UNIX. II. PO ...

  6. 显示器驱动程序 NVIDIA Windows Kernel Mode Driver Version 已停止响应 并且己成功恢复 解决方法

    原文:http://news.160.com/?p=1890 在玩游戏中 经常 出现显示器驱动程序 NVIDIA Windows Kernel Mode Driver Version 已停止响应 并且 ...

  7. Windows Kernel Way 1:Windows内核调试技术

    掌握Windows内核调试技术是学习与研究Windows内核的基础,调试Windows内核的方式大致分为两种: (1)通过Windbg工具在Windows系统运行之初连接到Windows内核,连接成功 ...

  8. OD: Windows Kernel Debug

    内核调试入门 内核程序运行在内核态,因此不能像对用户态应用程序那样来调试.关于内核调试方面的知识请参考<软件调试>这本书.目前内核调试主要有以下三种方法. 一是使用硬件调试器,它通过特定的 ...

  9. MS17-010 EternalBlue SMB Remote Windows Kernel Pool Corruption 2017-05-18 16:45

    wget "https://raw.githubusercontent.com/rapid7/metasploit-framework/6d81ca42087efd6548bfcf92417 ...

随机推荐

  1. 解决问题:centos虚拟机安装好nginx,本机无法访问

    阵子在虚拟机上装好了centos5.3,并配好了nginx+php+mysql,但是本机就是无法访问.一直就没去折腾了.具体情况如下1.本机能ping通虚拟机2.虚拟机也能ping通本机3.虚拟机能访 ...

  2. MySQL校对规则(三)

    校对规则:在当前编码下,字符之间的比较顺序是什么? ci:不区分大小写,Cs区分大小写, _bin 编码比较 每个字符集都支持不定数量的校对规则,可以通过如下指令: show collation 可以 ...

  3. Ajax的post方法,模拟 从后台读取数据小demo

    $(document).ready(function() { //定义一个函数 function timer() { $.post("1.json", function(data, ...

  4. list.clear()和list=null的区别

    以前并没有注意到list.clear()和list=null的区别,其实,区别在于 clear()方法是将list清空,但是对象的引用还在,只不过是一个表现为空引用 list=null是将list对象 ...

  5. 使用hadoop multipleOutputs对输出结果进行不一样的组织

    MapReduce job中,可以使用FileInputFormat和FileOutputFormat来对输入路径和输出路径来进行设置.在输出目录中,框架自己会自动对输出文件进行命名和组织,如:par ...

  6. The 1st day with Python

    刚开始实践python,遇到比较多的问题就是函数名.变量名输入错误,比较给力的按无论shell还是terminal给出的错误提示,按图索骥都能在网上找到相关解决办法,简单的自己也能顿悟. 典型的一个是 ...

  7. task2

    1. 邮件修改Mailtemplatereportfieldlink带<>的都改翻译${MAWBTask} 2.测试发邮件 3.找出能做成模版的所有地方,改成模版,复杂的地方记录下来

  8. Linux内存管理之地址映射

    写在前面:由于地址映射涉及到各种寄存器的设置访问,Linux对于不同体系结构处理器的地址映射采用不同的方法,例如对于i386及后来的32位的Intel的处理器在页式映射时采用的是2级页表映射,而对于I ...

  9. PHP流程控制分支结构

    1.顺序结构2.分支结构(条件结构.选择结构)    (1)单路分支        //条件bool,ture或false        if(条件){            执行语句:       ...

  10. 【LeetCode OJ】Longest Consecutive Sequence

    Problem Link: http://oj.leetcode.com/problems/longest-consecutive-sequence/ This problem is a classi ...