Shatter attacks - more techniques, more detail, more juicy goodness.
Introduction

Well, It's now two weeks since the release of Shatter, and my inbox has finally started calming down. I've tried to reply to most of the messages I've received, but I'm getting a lot of the same things said over and over and over again, and there's a fair amount of FUD going round about this thing. So, I've written this as a followup, to try and answer some of the more common questions I'm being asked, and to present some new Shatter techniques that I've been working on (often at the suggestion of others). Corrections are immediately below, followed by some new techniques, and then finally some explanations to common questions I'm being asked.

I have working code to substantiate most of what I say in here, but don't expect me to release ANY of it. Don't even ask. I only wrote the code because a) I wanted to prove to my own satisfaction whether or not these things are possible, and b) because I'm a professional security consultant. Anything that escalates privileges is useful to me, so I'm using these tools for my job. When I say that something works you'll just have to either take my word for it or write some code yourself to verify it. None of my code after Shatter is ever going to be released. Please don't waste my time and yours by asking for it.

The information contained in this followup is just the tip of the iceberg, believe me. Every time I work on Smashing (my own exploit code) I think of new techniques to try, new code injection mechanisms, and new services to exploit. These things are everywhere. There's a lot of ways to exploit them too - don't believe for a second that simply filtering WM_TIMER is going to fix this. It's not. One chap wrote an application to try and prove that message filtering was the solution to Shatter attacks. He successfully filtered WM_TIMER messages for the edit control in his test app, but forgot to filter the messages for the parent window. It took me less time to shatter his application than it did to write out an email explaining to him how to repeat my results. Smashing is now a generic exploit mechanism for these attacks, and adding new examples is trivial. I'm willing to bet that there are dozens of people around the world writing similar applications. My point has been proved - these vulnerabilities are everywhere, and they're going to keep on biting anyone trying to keep a system secure. Internet cafes beware.

Clarifications

A few things I got a little bit wrong...:)

1. WM_TIMER DOES get placed in the message queue. Yes, the application has the choice of whether or not to process the message. The problem is that unless a new handler for WM_TIMER has been installed, it's caught by DefWindowProc(), which conveniently jumps to the callback address, if specified. Yes, you can filter it out. No, that won't solve the problem (read on for why).

2. X11. The information I was given on X11 was a tad incomplete. Controls in X11 may or may not be windows in their own right, but either way they don't support the same kind of "do this" messages that Windows does (if I understand what people have been saying). Also, they have a flag to say whether they're real or "synthetic" messages, ie generated by real input or sent by another program. Win32 lacks this. X11 has its own set of issues, but it doesn't suffer from these same attacks in the same way as Win32. If you want to know more about how X11 works and what security measures are built in to make things better, I suggest you read this. Please don't ask me about X11 - I really don't know it in enough detail to answer most of the questions you have...

Spotlight

Lessons learned developing Lynis, an open source security auditing tool

Posted on 15 October 2014.  |  Lynis unearths vulnerabilities, configuration errors, and provides tips for system hardening. It is written in shell script, installation is not required and can be performed with a privileged or non-privileged account.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Mon, Oct 20th
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //