28 June 2007 | 6,304 views

VBootkit Bypasses Vista’s Digital Code Signing

Check For Vulnerabilities with Acunetix

At Black Hat Europe (in Amsterdam) security experts from India (Nitin and Vipin Kumar of NV labs) demonstrated a special boot loader that gets around Vista’s code-signing mechanisms. Known as VBoot and launching from a CD and booting Vista it can make on-the-fly changes in memory and in files being read.

In a demonstration, the “boot kit” managed to run with kernel privileges and issue system rights to a CMD shell when running on Vista RC2 (build 5744), even without a Microsoft signature

Experts say that the fundamental problem that this highlights is that every stage in Vista’s booting process works on blind faith that everything prior to it ran cleanly. The boot kit is therefore able to copy itself into the memory image even before Vista has booted and capture interrupt 13, which operating systems use for read access to sectors of hard drives, among other things.

As soon as the NT Boot sector loads Bootmgr.exe, VBootkit patches the security queries that ensure integrity and copies itself into an unused area of memory. Something similar is done with the subsequent boot stages of Winload.exe and NTOSKrnl.exe so that the boot kit is running in the background when the system is finally booted; at no time are Vista’s new security mechanisms, which were intended to prevent unsigned code from being executed with kernel privileges, set off.

Interesting eh, seen as though Microsoft touts Vista as so secure…and it’s already been taken apart.

It might lead to some interesting workarounds for DRM and video content protection.

From the Black Hat release:

Vboot kit is first of its kind technology to demonstrate Windows vista kernel subversion using custom boot sector. Vboot Kit shows how custom boot sector code can be used to circumvent the whole protection and security mechanisms of Windows Vista. The booting process of windows Vista is substantially different from the earlier versions of Windows. The talk will give you:

  • details and know abouts for the Vista booting process.
  • explain the vboot kit functionality and how it works.
  • insight into the Windows Vista Kernel.

We will also review sample Ring 0 Shell code (for Vista). The sample shellcode effectively raises the privileges of certain programs to SYSTEM. A live demonstration of vboot kit POC will be done.

Source: Heise Security



Recent in Exploits/Vulnerabilities:
- drozer – The Leading Security Testing Framework For Android
- Twitter Vulnerability Allows Deletion Of Payment Details
- Twitter Bug Bounty Official – Started Paying For Bugs

Related Posts:
- eLearnSecurity – Online Penetration Testing Training
- TDL AKA Alureon Rootkit Now Infecting 64-Bit Windows 7 Platform
- Chinese Firm Writes First SMS Worm

Most Read in Exploits/Vulnerabilities:
- Learn to use Metasploit – Tutorials, Docs & Videos - 227,569 views
- AJAX: Is your application secure enough? - 119,114 views
- eEye Launches 0-Day Exploit Tracker - 85,061 views

Low-cost VPS Hosting

2 Responses to “VBootkit Bypasses Vista’s Digital Code Signing”

  1. Gabriel Topala 28 June 2007 at 11:43 am Permalink

    The current Vboot kit doesn’t work with the final version of Vista.

    Nitin and Vipin Kumar told heise Security in an interview that this approach would also work on Vista Final (build 6000). They said that the only thing that stopped them from subsequently porting their kit to the final version of Vista was the cost.”

  2. Darknet 29 June 2007 at 8:24 am Permalink

    Thanks for pointing that out Gabriel. I guess it still goes to show with the resources that this could be applied to Vista final.