Free AI-powered learning to build in-demand skills
35% Off Finance Skills That Get You Hired - Code CFI35
Overview
Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Explore critical security vulnerabilities in WinPmem, the widely-used driver that powers popular forensic tools like Volatility and Velociraptor. Discover how this essential forensic component contains serious flaws including CVE-2024-10972, which enables effortless blue screen attacks that can halt forensic procedures, and CVE-2024-12668, which paradoxically allows malware to erase itself from memory during analysis. Learn about the time-of-check-time-of-use (TOCTOU) technique and understand how WinPmem can be exploited as a "bring your own vulnerable driver" (BYOVD) attack vector, enabling privilege escalation and unsigned driver loading. Gain detailed insights into Windows driver architecture and vulnerability discovery methodologies through illustrated explanations suitable for expanding your knowledge of "loldrivers." Examine the broader implications of kernel development challenges, including lessons from incidents like CrowdStrike's BSOD, while discussing the future of third-party kernel access and potential prevention strategies for exploits. Understand the complexity of fixing vulnerable drivers and explore code quality issues in driver design through multiple practical examples. Investigate the concerning trend of security tools that rely on drivers with poor implementation quality and dangerous features, positioning WinPmem as representative of a larger problem affecting highly privileged security products throughout the cybersecurity industry.
Syllabus
Recon 2025 - WinpMem: Volatility’s driver that lets malware volatilize
Taught by
Recon Conference