Exploit switches off Microsoft EMET's protection features
Posted on 02 July 2014.
By leveraging and modifying a "semi-random public exploit" researchers have managed to deactivate all protection features of the latest version of Microsoft's Enhanced Mitigation Experience Toolkit and "get shell" on the target system and execute code.


This is not the first time that researchers have managed to bypass EMET's protections, but Offensive Security's experts have decided on trying another approach: disarming the tool altogether.

And they were able to do it by changing a specific and easily accessible global variable in the .data section of the EMET.dll via a ROP chain. Then it only remained to disarm the tool's Export Access Filtering (EAF) mitigation feature, which they managed to do using a method previously published by another researchers.

"We have not seen this method of bypassing EMET in public exploits, however we do believe that Microsoft became aware of it as it has been corrected in Technical Preview versions of EMET 5 and greater," the researchers noted.

"What this shows is that while EMET is definitely a good utility and raises the bar for exploit developers, it is not a silver bullet in stopping these types of attacks."

EMET 5 Technical Preview can be downloaded here.





Spotlight

The evolution of backup and disaster recovery

Posted on 25 July 2014.  |  Amanda Strassle, IT Senior Director of Data Center Service Delivery at Seagate Technology, talks about enterprise backup issues, illustrates how the cloud shaping an IT department's approach to backup and disaster recovery, and more.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Mon, Jul 28th
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //