Chip Security TestingΒ 
Binary Security AnalysisΒ 
ResourcesΒ 
Blog
Contact us
Back to all articles
Vulnerability Research

Updated Analysis of PatchGuard on Microsoft Windows 10 RS4

1 min read
Edit by Marc Rambert β€’ Mar 8, 2019
Share

Since Windows 64b, PatchGuard has been of great interest in Windows security. In this white-paper, you will access our research done using esReven v2.

Β 

BANNER_End_2.png

Β 

For most iterations of its development, several people have analyzed its main mechanisms and internals which, many times, led to a functional bypass. Researchers seem to agree on one thing: bypassing PatchGuard will always be theoretically possible since it runs at the same level as a driver. Which seems true, theoretically. That said, just like vulnerability exploit isn’t about NOP-sled anymore, bypassing PatchGuard isn’t about hooking KeBugCheck anymore.

This paper will present a complete overview of PatchGuard mechanisms, from the initialization to the Blue Screen Of Death, and insights about how we implemented a driver able to disable it. Especially, this research has been conducted using timeless analysis with eShard’s tool esReven. Not a single debugger was used during this entire analysis.

Β 

BANNER_End_1.png TETRANE is now eShard

Β 

Share

Categories

All articles
(99)
Case Studies
(2)
Chip Security
(29)
Corporate News
(11)
Expert Review
(3)
Mobile App & Software
(27)
Vulnerability Research
(35)

you might also be interested in

Vulnerability Research
Corporate News

Introducing esReverse 2024.01 β€” for Binary Security Analysis

4 min read
Edit by Hugues Thiebeauld β€’ Mar 13, 2024
CopyRights eShard 2024.
All rights reserved
Privacy policy | Legal Notice