ANALYSIS OF THE ATTACK SURFACE OF WINDOWS 10 VIRTUALIZATION-BASED SECURITY

us-16-Wojtczuk-Analysis-Of-The-Attack-Surface-Of-Windows-10-Virtualization-Based-Security us-16-Wojtczuk-Analysis-Of-The-Attack-Surface-Of-Windows-10-Virtualization-Based-Security

05.08.2016 Views

aCG scenario 2upa Picture taken from BH2015 Microsoft presentation

aScenario 2 properties • No more cleartext creds in lsass, ever • Still, as before, until reboot, attacker can interact with CG and have it perform all SSOsupported authentications for remote resources • There is no reliable way to deliver “user has logged out, refuse future SSO” message to VTL1

aScenario 2 properties<br />

• No more cleartext creds in lsass, ever<br />

• Still, as before, until reboot, attacker can<br />

interact with CG and have it perform all SSOsupported<br />

authentications for remote resources<br />

• There is no reliable way to deliver “user has<br />

logged out, refuse future SSO” message to VTL1

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!