Launch a New Career with Certificates from Google, IBM & Microsoft
Learn EDR Internals: Research & Development From The Masters
Overview
Google, IBM & Meta Certificates — All 10,000+ Courses at 40% Off
One annual plan covers every course and certificate on Coursera. 40% off for a limited time.
Get Full Access
Explore a groundbreaking security presentation from DEF CON 32 that reveals critical vulnerabilities in Windows Update systems through downgrade attacks. Learn how researchers discovered methods to manipulate Windows Updates, enabling the creation of downgrading updates that bypass verification steps and compromise system security. Dive into technical demonstrations showing successful downgrades of DLLs, drivers, and kernel components while maintaining a falsely "fully updated" system status. Understand the implications for virtualization security as the research exposes ways to downgrade Hyper-V's hypervisor, Secure Kernel, and Credential Guard. Examine the first known bypass of VBS's UEFI locks and discover how unprivileged attackers can exploit Windows Update restoration vulnerabilities. Get introduced to "Windows Downdate," a powerful tool that demonstrates how these downgrade attacks can potentially affect any Windows machine globally, challenging the concept of "fully patched" systems.
Syllabus
DEF CON 32 - Windows Downdate: Downgrade Attacks Using Windows Updates - Alon Leviev
Taught by
DEFCONConference