The first Windows 8 Bootkit which is the brainchild of wellknown security analyst Peter Kleissner,the Bootkit said to have successfully started the Bootkit from USB/CD and the infector and bypassed the UAC on admin account. -> UAC (default setting) on 8 with admin account.The Bootkit was to be demonstrated at the Malcon 2011 which is ongoing in mumbai (25th and 26th November) held today in Mumbai.
Sadly though he won’t be present for the conference physically,but would be addressing the attendees with his Video message and Vipin kumar might represent him on behalf tomorrow at the conference according to his Twitter updates. Today he uploaded a video Demonstrating the Bootkit for Windows8.
http://vimeo.com/32666961
This demonstration shows us how the Stoned Lite is used to get SYSTEM rights on Windows 8 through the cmd privilege escalation (done by a driver loaded by the bootkit). The infector used in this task is just 14 KB of size and it bypasses the UAC.The hack actually hacks the legacy BIOS and not the UFEI or the secure boot of Windows 8.
As we have already mentioned in our previous post that he has sent the full source and the paper for the Bootkit to Microsoft along with his suggestions,we can expect some more security measures from the software giant to make Windows 8 more secured.
No hay comentarios:
Publicar un comentario