05.08.2016 Views

ANALYSIS OF THE ATTACK SURFACE OF WINDOWS 10 VIRTUALIZATION-BASED SECURITY

us-16-Wojtczuk-Analysis-Of-The-Attack-Surface-Of-Windows-10-Virtualization-Based-Security

us-16-Wojtczuk-Analysis-Of-The-Attack-Surface-Of-Windows-10-Virtualization-Based-Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Credentials during logon ?<br />

• There is still a problem with how the unencrypted<br />

credentials are initially delivered to VTL1 (which happens<br />

during logon).“rundll32.exe user32.dll,LockWorkStation”.<br />

• If not using smart-card based authentication, then the<br />

plaintext credentials can be captured by keylogger and<br />

used anywhere, anytime.<br />

• In case of smart-card based authentication, the NTOWF<br />

hashes sent by KDC can be captured and reused.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!